Analysis Overview
SHA256
3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2
Threat Level: Known bad
The file NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe was found to be: Known bad.
Malicious Activity Summary
Glupteba
Windows security bypass
RedLine
Glupteba payload
Amadey
SmokeLoader
SectopRAT payload
RedLine payload
Modifies Windows Defender Real-time Protection settings
SectopRAT
DcRat
Modifies boot configuration data using bcdedit
Downloads MZ/PE file
Drops file in Drivers directory
Possible attempt to disable PatchGuard
Modifies Windows Firewall
Executes dropped EXE
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Reads user/profile data of local email clients
.NET Reactor proctector
Checks computer location settings
Loads dropped DLL
Windows security modification
Manipulates WinMonFS driver.
Manipulates WinMon driver.
Legitimate hosting services abused for malware hosting/C2
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Drops file in System32 directory
Detected potential entity reuse from brand microsoft.
Suspicious use of SetThreadContext
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Windows directory
Launches sc.exe
Program crash
Unsigned PE
Enumerates physical storage devices
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Checks SCSI registry key(s)
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Uses Task Scheduler COM API
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies data under HKEY_USERS
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
Suspicious behavior: LoadsDriver
Suspicious behavior: GetForegroundWindowSpam
Modifies system certificate store
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-10-18 17:51
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-18 17:51
Reported
2023-10-18 17:54
Platform
win7-20230831-en
Max time kernel
145s
Max time network
154s
Command Line
Signatures
Amadey
DcRat
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Glupteba
Glupteba payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SmokeLoader
Windows security bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Modifies boot configuration data using bcdedit
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
| N/A | N/A | C:\Windows\system32\bcdedit.exe | N/A |
Downloads MZ/PE file
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\system32\drivers\Winmon.sys | C:\Windows\rss\csrss.exe | N/A |
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Possible attempt to disable PatchGuard
.NET Reactor proctector
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\31839b57a4f11171d6abc8bbc4451ee4.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Windows\rss\csrss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup7 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP007.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\FA24.exe'\"" | C:\Users\Admin\AppData\Local\Temp\FA24.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\A860.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup6 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe | N/A |
Checks installed software on the system
Manipulates WinMon driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMon | C:\Windows\rss\csrss.exe | N/A |
Manipulates WinMonFS driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMonFS | C:\Windows\rss\csrss.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2140 set thread context of 2704 | N/A | C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 2984 set thread context of 3064 | N/A | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 1908 set thread context of 840 | N/A | C:\Users\Admin\AppData\Local\Temp\DD1F.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe |
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Logs\CBS\CbsPersist_20231018175315.cab | C:\Windows\system32\makecab.exe | N/A |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\BFEB.exe |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\F3BD.exe |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607f6a00ec01da01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "404416552" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{209B9DA1-6DDF-11EE-A116-76A8121F2E0E} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea3dc2a7c0fe4d49bd6e8f3e7e71513f000000000200000000001066000000010000200000000088e62c3a288ab38c48b5ec120ec4a7c841e9d4686be21db94bad9c3a1666a8000000000e80000000020000200000003b63cf74e657aa5586ba317d52ea45f90f087e2d7a260778c6585e35122d5c572000000058bcd77cae15b332bf3386088f17b14dcf5d04b6bc888931f81127f30eeb31d24000000081768f2fe32c2f1e6cf3f87941391e3d59dfea390afde97d83a92a6970fce37549d7b4a67054be96a53966e6be9a9dd2b69d0ef52aeebd80cf816e393ab5075a | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-522 = "N. Central Asia Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-422 = "Russian Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-581 = "North Asia East Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" | C:\Windows\system32\netsh.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Modifies system certificate store
| Description | Indicator | Process | Target |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 040000000100000010000000acb694a59c17e0d791529bb19706a6e40f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47419000000010000001000000068cb42b035ea773e52ef50ecf50ec52920000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 0f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a42000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 19000000010000001000000014c3bd3549ee225aece13734ad8ca0b81400000001000000140000004e2254201895e6e36ee60ffafab912ed06178f39030000000100000014000000df3c24f9bfd666761b268073fe06d1cc8d4f82a40f00000001000000200000004b4eb4b074298b828b5c003095a10b4523fb951c0c88348b09c53e5baba408a3040000000100000010000000e4a68ac854ac5242460afd72481b2a442000000001000000920300003082038e30820276a0030201020210033af1e6a711a9a0bb2864b11d09fae5300d06092a864886f70d01010b05003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204732301e170d3133303830313132303030305a170d3338303131353132303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420473230820122300d06092a864886f70d01010105000382010f003082010a0282010100bb37cd34dc7b6bc9b26890ad4a75ff46ba210a088df51954c9fb88dbf3aef23a89913c7ae6ab061a6bcfac2de85e092444ba629a7ed6a3a87ee054752005ac50b79c631a6c30dcda1f19b1d71edefdd7e0cb948337aeec1f434edd7b2cd2bd2ea52fe4a9b8ad3ad499a4b625e99b6b00609260ff4f214918f76790ab61069c8ff2bae9b4e992326bb5f357e85d1bcd8c1dab95049549f3352d96e3496ddd77e3fb494bb4ac5507a98f95b3b423bb4c6d45f0f6a9b29530b4fd4c558c274a57147c829dcd7392d3164a060c8c50d18f1e09be17a1e621cafd83e510bc83a50ac46728f67314143d4676c387148921344daf0f450ca649a1babb9cc5b1338329850203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e041604144e2254201895e6e36ee60ffafab912ed06178f39300d06092a864886f70d01010b05000382010100606728946f0e4863eb31ddea6718d5897d3cc58b4a7fe9bedb2b17dfb05f73772a3213398167428423f2456735ec88bff88fb0610c34a4ae204c84c6dbf835e176d9dfa642bbc74408867f3674245ada6c0d145935bdf249ddb61fc9b30d472a3d992fbb5cbbb5d420e1995f534615db689bf0f330d53e31e28d849ee38adada963e3513a55ff0f970507047411157194ec08fae06c49513172f1b259f75f2b18e99a16f13b14171fe882ac84f102055d7f31445e5e044f4ea879532930efe5346fa2c9dff8b22b94bd90945a4dea4b89a58dd1b7d529f8e59438881a49e26d56faddd0dc6377ded03921be5775f76ee3c8dc45d565ba2d9666eb33537e532b6 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 | C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 | C:\Windows\rss\csrss.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 | C:\Windows\rss\csrss.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\ADB1.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\C77B.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CFA6.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Token: SeImpersonatePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\rss\csrss.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\oldplayer.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe
"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
C:\Users\Admin\AppData\Local\Temp\A860.exe
C:\Users\Admin\AppData\Local\Temp\A860.exe
C:\Users\Admin\AppData\Local\Temp\A91C.exe
C:\Users\Admin\AppData\Local\Temp\A91C.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
C:\Windows\system32\cmd.exe
cmd /c ""C:\Users\Admin\AppData\Local\Temp\AB2F.bat" "
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
C:\Users\Admin\AppData\Local\Temp\ABEC.exe
C:\Users\Admin\AppData\Local\Temp\ABEC.exe
C:\Users\Admin\AppData\Local\Temp\ADB1.exe
C:\Users\Admin\AppData\Local\Temp\ADB1.exe
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/login
C:\Users\Admin\AppData\Local\Temp\B6A7.exe
C:\Users\Admin\AppData\Local\Temp\B6A7.exe
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
C:\Users\Admin\AppData\Local\Temp\BFEB.exe
C:\Users\Admin\AppData\Local\Temp\BFEB.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 524
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
C:\Users\Admin\AppData\Local\Temp\C77B.exe
C:\Users\Admin\AppData\Local\Temp\C77B.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "explothe.exe" /P "Admin:N"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
C:\Windows\SysWOW64\cacls.exe
CACLS "explothe.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cacls.exe
CACLS "..\fefffe8cea" /P "Admin:N"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\fefffe8cea" /P "Admin:R" /E
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
C:\Users\Admin\AppData\Local\Temp\CFA6.exe
C:\Users\Admin\AppData\Local\Temp\CFA6.exe
C:\Users\Admin\AppData\Local\Temp\DD1F.exe
C:\Users\Admin\AppData\Local\Temp\DD1F.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
C:\Users\Admin\AppData\Local\Temp\EEFB.exe
C:\Users\Admin\AppData\Local\Temp\EEFB.exe
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\Temp\F3BD.exe
C:\Users\Admin\AppData\Local\Temp\F3BD.exe
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
C:\Users\Admin\AppData\Local\Temp\FA24.exe
C:\Users\Admin\AppData\Local\Temp\FA24.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 508
C:\Users\Admin\AppData\Local\Temp\FDCD.exe
C:\Users\Admin\AppData\Local\Temp\FDCD.exe
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
C:\Windows\SysWOW64\cacls.exe
CACLS "oneetx.exe" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "oneetx.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\207aa4515d" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\207aa4515d" /P "Admin:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\system32\taskeng.exe
taskeng.exe {0EE96C88-C634-4376-884B-17ECEAB6ADD0} S-1-5-21-686452656-3203474025-4140627569-1000:UUVOHKNL\Admin:Interactive:[1]
C:\Users\Admin\AppData\Local\Temp\2F49.exe
C:\Users\Admin\AppData\Local\Temp\2F49.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Windows\system32\makecab.exe
"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231018175315.log C:\Windows\Logs\CBS\CbsPersist_20231018175315.cab
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe
"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe"
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\system32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
C:\Windows\system32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -timeout 0
C:\Windows\system32\bcdedit.exe
C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
C:\Windows\system32\bcdedit.exe
C:\Windows\Sysnative\bcdedit.exe /v
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
Network
| Country | Destination | Domain | Proto |
| RU | 5.42.92.88:80 | 5.42.92.88 | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.68.29:80 | 77.91.68.29 | tcp |
| RU | 5.42.92.88:80 | 5.42.92.88 | tcp |
| FI | 77.91.68.52:80 | 77.91.68.52 | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| TR | 185.216.70.222:80 | 185.216.70.222 | tcp |
| US | 8.8.8.8:53 | www.facebook.com | udp |
| RU | 5.42.92.88:80 | 5.42.92.88 | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.1:80 | 77.91.124.1 | tcp |
| NL | 85.209.176.128:80 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| IT | 185.196.9.65:80 | tcp | |
| BG | 171.22.28.213:80 | 171.22.28.213 | tcp |
| US | 8.8.8.8:53 | static.xx.fbcdn.net | udp |
| US | 8.8.8.8:53 | facebook.com | udp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 157.240.5.35:443 | facebook.com | tcp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 157.240.5.35:443 | facebook.com | tcp |
| US | 157.240.5.10:443 | static.xx.fbcdn.net | tcp |
| US | 8.8.8.8:53 | fbcdn.net | udp |
| US | 157.240.5.35:443 | fbcdn.net | tcp |
| US | 157.240.5.35:443 | fbcdn.net | tcp |
| RU | 5.42.65.80:80 | 5.42.65.80 | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| TR | 185.216.70.238:37515 | tcp | |
| US | 8.8.8.8:53 | fbsbx.com | udp |
| US | 157.240.5.35:443 | fbsbx.com | tcp |
| US | 157.240.5.35:443 | fbsbx.com | tcp |
| FI | 77.91.124.71:4341 | tcp | |
| RU | 5.42.65.80:80 | 5.42.65.80 | tcp |
| US | 8.8.8.8:53 | api.ip.sb | udp |
| US | 8.8.8.8:53 | hellouts.fun | udp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 172.67.75.172:443 | api.ip.sb | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.68.29:80 | 77.91.68.29 | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 157.240.5.35:443 | fbsbx.com | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| NL | 85.209.176.128:80 | tcp | |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| US | 8.8.8.8:53 | 15a759a6-fcfc-4628-9e52-106736e9826d.uuid.statsexplorer.org | udp |
| FI | 77.91.124.1:80 | 77.91.124.1 | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| US | 8.8.8.8:53 | msdl.microsoft.com | udp |
| US | 204.79.197.219:443 | msdl.microsoft.com | tcp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 8.8.8.8:53 | vsblobprodscussu5shard30.blob.core.windows.net | udp |
| US | 20.150.70.36:443 | vsblobprodscussu5shard30.blob.core.windows.net | tcp |
| NL | 85.209.176.128:80 | tcp | |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| NL | 85.209.176.128:80 | tcp | |
| US | 8.8.8.8:53 | vsblobprodscussu5shard58.blob.core.windows.net | udp |
| US | 20.150.38.228:443 | vsblobprodscussu5shard58.blob.core.windows.net | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| US | 8.8.8.8:53 | stun.ipfire.org | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | server1.statsexplorer.org | udp |
Files
\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
memory/2704-55-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-61-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/2704-59-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-62-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-57-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-53-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-66-0x0000000000400000-0x000000000040A000-memory.dmp
memory/2704-64-0x0000000000400000-0x000000000040A000-memory.dmp
\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
memory/3064-86-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
memory/3064-84-0x0000000000400000-0x0000000000409000-memory.dmp
memory/3064-87-0x0000000000400000-0x0000000000409000-memory.dmp
memory/3064-82-0x0000000000400000-0x0000000000409000-memory.dmp
memory/3064-88-0x0000000000400000-0x0000000000409000-memory.dmp
\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
memory/2176-95-0x0000000000BE0000-0x0000000000C1E000-memory.dmp
memory/1232-96-0x0000000002B70000-0x0000000002B86000-memory.dmp
memory/3064-97-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\A860.exe
| MD5 | 8ac0b2b62cec4ec1a135c39d1287a00d |
| SHA1 | dd5b06aeaa6f01c3939b45167bc77763801ac1e0 |
| SHA256 | d38e0dd3fd6479789dc060303ab12e438463560f2b555e73dabfe1c4a350ceea |
| SHA512 | 62f38da3ebc2b64118984d07d31a3a9f48e34be437414fec16f01671cd4b8b666054d2fadadd41247363c540f6836756efbd05d5b7b0f2130ce473f7903919f7 |
\Users\Admin\AppData\Local\Temp\A860.exe
| MD5 | 8ac0b2b62cec4ec1a135c39d1287a00d |
| SHA1 | dd5b06aeaa6f01c3939b45167bc77763801ac1e0 |
| SHA256 | d38e0dd3fd6479789dc060303ab12e438463560f2b555e73dabfe1c4a350ceea |
| SHA512 | 62f38da3ebc2b64118984d07d31a3a9f48e34be437414fec16f01671cd4b8b666054d2fadadd41247363c540f6836756efbd05d5b7b0f2130ce473f7903919f7 |
C:\Users\Admin\AppData\Local\Temp\A860.exe
| MD5 | 8ac0b2b62cec4ec1a135c39d1287a00d |
| SHA1 | dd5b06aeaa6f01c3939b45167bc77763801ac1e0 |
| SHA256 | d38e0dd3fd6479789dc060303ab12e438463560f2b555e73dabfe1c4a350ceea |
| SHA512 | 62f38da3ebc2b64118984d07d31a3a9f48e34be437414fec16f01671cd4b8b666054d2fadadd41247363c540f6836756efbd05d5b7b0f2130ce473f7903919f7 |
C:\Users\Admin\AppData\Local\Temp\A91C.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\A91C.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\AB2F.bat
| MD5 | 403991c4d18ac84521ba17f264fa79f2 |
| SHA1 | 850cc068de0963854b0fe8f485d951072474fd45 |
| SHA256 | ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f |
| SHA512 | a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576 |
\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\4rj187su.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\ABEC.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\ABEC.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\AB2F.bat
| MD5 | 403991c4d18ac84521ba17f264fa79f2 |
| SHA1 | 850cc068de0963854b0fe8f485d951072474fd45 |
| SHA256 | ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f |
| SHA512 | a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576 |
memory/1732-173-0x0000000000B80000-0x0000000000BBE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ADB1.exe
| MD5 | 425e2a994509280a8c1e2812dfaad929 |
| SHA1 | 4d5eff2fb3835b761e2516a873b537cbaacea1fe |
| SHA256 | 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a |
| SHA512 | 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0 |
\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
C:\Users\Admin\AppData\Local\Temp\B6A7.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
C:\Users\Admin\AppData\Local\Temp\B6A7.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
memory/2476-198-0x00000000003E0000-0x0000000000400000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\B6A7.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
C:\Users\Admin\AppData\Local\Temp\BFEB.exe
| MD5 | b9fbf1ffd7f18fa178219df9e5a4d7f9 |
| SHA1 | be2d63df44dbbb754fc972e18adf9d56a1adcce4 |
| SHA256 | 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f |
| SHA512 | ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8 |
C:\Users\Admin\AppData\Local\Temp\BFEB.exe
| MD5 | b9fbf1ffd7f18fa178219df9e5a4d7f9 |
| SHA1 | be2d63df44dbbb754fc972e18adf9d56a1adcce4 |
| SHA256 | 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f |
| SHA512 | ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8 |
\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
memory/2476-218-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/1732-215-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2476-219-0x0000000004640000-0x0000000004680000-memory.dmp
memory/2476-220-0x0000000001F60000-0x0000000001F7E000-memory.dmp
memory/820-222-0x0000000000400000-0x0000000000470000-memory.dmp
memory/820-221-0x0000000000300000-0x000000000035A000-memory.dmp
memory/820-226-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2476-233-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-234-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-236-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-238-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-240-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-242-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2808-244-0x0000000000C90000-0x0000000000CAE000-memory.dmp
memory/2476-245-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2808-246-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2476-249-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-251-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2808-248-0x0000000004830000-0x0000000004870000-memory.dmp
memory/2476-253-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-255-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-257-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-259-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-261-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-263-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-265-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/2476-269-0x0000000001F60000-0x0000000001F78000-memory.dmp
memory/3008-270-0x0000000000130000-0x000000000016E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\CabCE78.tmp
| MD5 | f3441b8572aae8801c04f3060b550443 |
| SHA1 | 4ef0a35436125d6821831ef36c28ffaf196cda15 |
| SHA256 | 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf |
| SHA512 | 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9 |
C:\Users\Admin\AppData\Local\Temp\TarCFC2.tmp
| MD5 | 9441737383d21192400eca82fda910ec |
| SHA1 | 725e0d606a4fc9ba44aa8ffde65bed15e65367e4 |
| SHA256 | bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5 |
| SHA512 | 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf |
memory/2836-314-0x00000000013B0000-0x000000000140A000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 8b9f22e743b03f0b7bfedb0347df6fa9 |
| SHA1 | ce78e657a785a752c394d8da1c381c84da69383c |
| SHA256 | 843bf3cfb18c9475a7e06a0ee0e6262283d3a5d2caa6edc21e46b917b518cd1f |
| SHA512 | 8d15cf4b89b7890d7a2aabe3488c255ee62372a4585b627138369d3e80fa4892b5b6098a99a337c9161cfd5e2f15238e79c1b356c4c3243ddd86809a2e5df7f9 |
memory/1732-323-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2836-324-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2476-325-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2836-326-0x0000000000B40000-0x0000000000B80000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 78d0b96c23993d07e27fb4ed5db3dab7 |
| SHA1 | 527aa8c30b77ecc25e717dea4b4e940284e5fbce |
| SHA256 | 1f1c7812b6d4a604b7abf91bd7e32eb98a447da1483b06e0eeeae50e58167a9d |
| SHA512 | 65e2583f733f658b09733c5da473aeb548159a2b05041c72c4ea5be4d0ef22b4cfd9183f64bc67207db403615f3bdb9d6a5ad255b222cc65bd4c01750a3101ad |
memory/840-375-0x0000000000400000-0x000000000043E000-memory.dmp
memory/840-376-0x0000000000400000-0x000000000043E000-memory.dmp
memory/2808-379-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/1908-382-0x00000000009B0000-0x0000000000ACB000-memory.dmp
memory/820-374-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/1908-384-0x00000000009B0000-0x0000000000ACB000-memory.dmp
memory/840-401-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/840-451-0x0000000000400000-0x000000000043E000-memory.dmp
memory/2836-462-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2876-461-0x0000000000BB0000-0x0000000001008000-memory.dmp
memory/2876-463-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/840-476-0x0000000007490000-0x00000000074D0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 81e4fc7bd0ee078ccae9523fa5cb17a3 |
| SHA1 | 4d25ca2e8357dc2688477b45247d02a3967c98a4 |
| SHA256 | c867c3bda7b6f6bd228a4d7656c069bd6cf4f67ba4b075cf4113f5b109e7d9ee |
| SHA512 | 4cfc68d7450ecdeaa56db50297bd233857b8a92265f57bfadb33ab9eb8bafbd77d8db609f8419a48f20ba0e7f8ad62063fd338536cd6319d1ed830405100ed22 |
C:\Users\Admin\AppData\Local\Temp\F3BD.exe
| MD5 | 42d97769a8cfdfedac8e03f6903e076b |
| SHA1 | 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe |
| SHA256 | f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b |
| SHA512 | 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77 |
memory/2876-562-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/2836-564-0x0000000000B40000-0x0000000000B80000-memory.dmp
memory/1676-565-0x0000000000400000-0x0000000000430000-memory.dmp
memory/1676-576-0x0000000000020000-0x000000000003E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\FA24.exe
| MD5 | 395e28e36c665acf5f85f7c4c6363296 |
| SHA1 | cd96607e18326979de9de8d6f5bab2d4b176f9fb |
| SHA256 | 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa |
| SHA512 | 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de |
memory/2476-577-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/1676-578-0x0000000073D10000-0x00000000743FE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\FDCD.exe
| MD5 | d5752c23e575b5a1a1cc20892462634a |
| SHA1 | 132e347a010ea0c809844a4d90bcc0414a11da3f |
| SHA256 | c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb |
| SHA512 | ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8 |
memory/2136-589-0x0000000004DF0000-0x00000000056DB000-memory.dmp
memory/2136-583-0x00000000049F0000-0x0000000004DE8000-memory.dmp
memory/840-590-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/844-591-0x0000000000250000-0x0000000000251000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
| MD5 | a64a886a695ed5fb9273e73241fec2f7 |
| SHA1 | 363244ca05027c5beb938562df5b525a2428b405 |
| SHA256 | 563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144 |
| SHA512 | 122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2DS6H085\hLRJ1GG_y0J[1].ico
| MD5 | 8cddca427dae9b925e73432f8733e05a |
| SHA1 | 1999a6f624a25cfd938eef6492d34fdc4f55dedc |
| SHA256 | 89676a3fb8639d6531c525e5800ff4cc44d06d27ff5607922d27e390eb5b6e62 |
| SHA512 | 20fbee2886995c253e762f2bb814ad16890b0989deab4d92394363ef0060b96a634d87c380c7ba1b787a8ab312be968fed9329a729b4e0d64235a09e397db740 |
memory/2136-608-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/840-609-0x0000000007490000-0x00000000074D0000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 109f6e2f3f27968f65c6bbced136d68e |
| SHA1 | 2ca0dd0dcdb8269f4664048be9037f3a430536a3 |
| SHA256 | b2f598dee3975a1731b4a71e4285b78ba92feea38251ce72b201cb2e497475ac |
| SHA512 | c9aa4154530d5daa6aa963c5b77eb5f109d32f4a029c76e54deadaf2af09d3442c866ad611887482df90228272d697cfd726c86decbb6569286cbcd8254d6771 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 8e35863aef47f62e98c63b6b04a0192f |
| SHA1 | 388c108a5771e1a9cb473b6fc5ebf50eac580143 |
| SHA256 | 850212893c70f3ac9e0dc5eb6cd4ed78b74031b26c1822b5dfd388942c2f9168 |
| SHA512 | 8df5fcdfb4ec70137582d4af9e4674aaf8775107c58901066781526b96f0ef4d341e2ef9cd2819a4a92e77e0cb97579c8c7009f835b9a9c9d05b9e3e621deaab |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 76440473f9eab55a7b53fb8bdc74c240 |
| SHA1 | 862c03850771f54712229aca45c6a9991db7d53a |
| SHA256 | 37162142a9e42d072d0db6b05da7d214db92a22c529e5921dc44a56626b69871 |
| SHA512 | 8b310dfd89b605599be4e593da250dc1aae911e2afa7914f00b6d07ac0a5f94b61113c646eb82ecd3ca75ea45fa446490668b23905f809cb7c1004cb60cfe012 |
memory/1676-798-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 521df209085e337c218fb6cb975f1220 |
| SHA1 | a27e2204800d62511cceacad10c2cc1cca9aad0f |
| SHA256 | b3e77842656241641781bdf77aba8f7265f2604ee023a881857dcb1e57822229 |
| SHA512 | 4553e635f38101fa7e890c97889a1cdc9503de8d6d146047e1591255e1ad458793ee605e96bcefe9978eddcef6463b7c73625517af385c500decf24baafc84f0 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 7ae40f63f4e025a6c748b40532b5f942 |
| SHA1 | ecb04c0bf806b5c05344aef01e830012f41530d2 |
| SHA256 | 7ecded576e196867aacb949d12260c7c541d3f72c225c840fa3bd1d754ecf8bd |
| SHA512 | 63d4e1062bf9c567596dff556ba5a4226ffa0918e925a2766e2484e5315dab54dcb57b0612507b9fbe3dbc82aacbc4c7054c7369d06981aaf9cbbc7a8ecc2b16 |
memory/2136-865-0x00000000049F0000-0x0000000004DE8000-memory.dmp
memory/2136-884-0x0000000004DF0000-0x00000000056DB000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6911465d2fee39c0f8a3f818f6463872 |
| SHA1 | fbbf4bc55baa8aea5f6a130a6e02136d5a9a890e |
| SHA256 | cfaae1fe96614571e3e34b634b07ade73b3234016a3373aadaeb5ce7a08920df |
| SHA512 | f02c1dda5db64b5b406c83471cd801d1cb25d2b870bf7949d522dd8d759e3f9421b096e325977e0d218ee7f8d556dfab3b68b313bf4d8a1b354e26ebc7966138 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 54de75efc323b260bf8142ec87ac5d12 |
| SHA1 | d625583834f4dfee203e3502c18fada44897bb47 |
| SHA256 | 15fb6241a009d703b45aec598ab30867f59d4de74f151f621de0f1ef36ade29a |
| SHA512 | 1dda1167e891f3085ec20e28c18a6d4dde9e35c24d6f6e9dbe18c5cf04834c8561df7f024424e04d9537e2eb3aba1530c4bc2c93e5c1bca8a7e4da154f8ed9c8 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 7ac3fdf552d89908f7912008996a7bd0 |
| SHA1 | 7574667fbcf2b18a938a64d9ec1ab8adcfec63fc |
| SHA256 | 3aae8553353d34f203c4c573e2fd6f15206a108597472a9618472e159072746a |
| SHA512 | 7f9fb7429a190e7ebeb1ecc65d534ddead1fd11a769d2ab2c0bf4856909cb148e418c79e7569dd4e0d02f4264ce4f3bdaf3a3eb6aab8f8978688f2a1e6b798d3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c67d0436a1123dda866a479816133a28 |
| SHA1 | eca7d206bf098ea0c6093c3b7e2fe88806b5e62b |
| SHA256 | 9766f359ec304a1946e116a641aaa11b977cefa77155d668f70cd8645ba7c537 |
| SHA512 | 45b525a988a7fc75f37d464a8eb3883134e67807e1dda7d63f5da806412a97ef5d53dbda159d70b8917b8ff34ca6380737f26315bb6fa5146341cf5da15c9a35 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b89a062256eff421fce2193d9f8b4a66 |
| SHA1 | da6acbe3d7fc5b6f163ae0cbbc0431d5019d2874 |
| SHA256 | 67ed89e1607c9258efb6283455733b4b4d52538d02c80018d32aa82f944f8970 |
| SHA512 | 335a27dd3af6b786fa86be111f49a466cf201e833a528b04befc1c9cec206944cec7417472461a8e2dadc30207802b920bc6639ced3d49c294c1bcc4721b61a9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b47e274bd4754dbee9d51f81d799c813 |
| SHA1 | dabd25ba868c660b5d6dbf501aef4e5037061efd |
| SHA256 | 6289a65321e95945629de6ede46ddc3e0d3447526b6ba9a67acbe6deed46a7cb |
| SHA512 | 633da8615ce1b6a8c02c88e2f8814097a03aafcdc59120c8d9106257ac984222415f76bc55ac279cc6982c64ecba51ef0fe16a65fc18bec93099bccbf0adabfe |
memory/2136-1183-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/2136-1201-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/1628-1202-0x0000000004B20000-0x0000000004F18000-memory.dmp
memory/1628-1203-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/2836-1204-0x0000000073D10000-0x00000000743FE000-memory.dmp
memory/1628-1212-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/1860-1213-0x0000000004AD0000-0x0000000004EC8000-memory.dmp
memory/1860-1214-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/840-1215-0x0000000073D10000-0x00000000743FE000-memory.dmp
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
| MD5 | a5b509a3fb95cc3c8d89cd39fc2a30fb |
| SHA1 | 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c |
| SHA256 | 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529 |
| SHA512 | 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9 |
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
| MD5 | e913b0d252d36f7c9b71268df4f634fb |
| SHA1 | 5ac70d8793712bcd8ede477071146bbb42d3f018 |
| SHA256 | 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da |
| SHA512 | 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4 |
memory/1860-1228-0x0000000004AD0000-0x0000000004EC8000-memory.dmp
memory/896-1240-0x00000000006A0000-0x0000000000C88000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe
| MD5 | 1afff8d5352aecef2ecd47ffa02d7f7d |
| SHA1 | 8b115b84efdb3a1b87f750d35822b2609e665bef |
| SHA256 | c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1 |
| SHA512 | e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb |
memory/896-1245-0x0000000000820000-0x0000000000E08000-memory.dmp
memory/1860-1246-0x0000000000400000-0x0000000002FB8000-memory.dmp
memory/896-1267-0x00000000006A0000-0x0000000000C88000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2DS6H085\suggestions[1].en-US
| MD5 | 5a34cb996293fde2cb7a4ac89587393a |
| SHA1 | 3c96c993500690d1a77873cd62bc639b3a10653f |
| SHA256 | c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad |
| SHA512 | e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee |
C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error
| MD5 | fd2727132edd0b59fa33733daa11d9ef |
| SHA1 | 63e36198d90c4c2b9b09dd6786b82aba5f03d29a |
| SHA256 | 3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e |
| SHA512 | 3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e |
C:\Users\Admin\AppData\Local\Temp\osloader.exe
| MD5 | e2f68dc7fbd6e0bf031ca3809a739346 |
| SHA1 | 9c35494898e65c8a62887f28e04c0359ab6f63f5 |
| SHA256 | b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4 |
| SHA512 | 26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579 |
C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error
| MD5 | 5da3a881ef991e8010deed799f1a5aaf |
| SHA1 | fea1acea7ed96d7c9788783781e90a2ea48c1a53 |
| SHA256 | f18fdb9e03546bfb98397bcb8378b505eaf4ac061749229a7ee92a1c3cf156e4 |
| SHA512 | 24fbcb5353a3d51ee01f1de1bbb965f9e40e0d00e52c42713d446f12edceeb8d08b086a8687a6188decaa8f256899e24a06c424d8d73adaad910149a9c45ef09 |
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-18 17:51
Reported
2023-10-18 17:54
Platform
win10v2004-20230915-en
Max time kernel
152s
Max time network
159s
Command Line
Signatures
Amadey
DcRat
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Glupteba
Modifies Windows Defender Real-time Protection settings
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SectopRAT
SectopRAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
SmokeLoader
Downloads MZ/PE file
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
.NET Reactor proctector
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5559.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\oldplayer.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\39BD.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\35D0.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Windows\rss\csrss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup6 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\5C7F.exe'\"" | C:\Users\Admin\AppData\Local\Temp\5C7F.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup7 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP007.TMP\\\"" | C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Manipulates WinMonFS driver.
| Description | Indicator | Process | Target |
| File opened for modification | \??\WinMonFS | C:\Windows\rss\csrss.exe | N/A |
Detected potential entity reuse from brand microsoft.
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File created | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 4936 set thread context of 60 | N/A | C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 4412 set thread context of 4964 | N/A | C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe |
| PID 4300 set thread context of 2936 | N/A | C:\Users\Admin\AppData\Local\Temp\4913.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe |
Checks for VirtualBox DLLs, possible anti-VM trick
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\VBoxMiniRdrDN | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
| File opened for modification | C:\Windows\windefender.exe | C:\Windows\rss\csrss.exe | N/A |
| File opened for modification | C:\Windows\rss | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| File created | C:\Windows\rss\csrss.exe | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Enumerates physical storage devices
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Key enumerated | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" | C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\38C2.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\3DD6.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\59FD.exe | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
| Token: SeShutdownPrivilege | N/A | N/A | N/A |
| Token: SeCreatePagefilePrivilege | N/A | N/A | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe
"C:\Users\Admin\AppData\Local\Temp\NEAS.NEASNEAS3b75fef36f2d68ceed33969816c1c90b4094db8c1a2bc98d848857f904da21e2exeexeexe_JC.exe"
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
C:\Users\Admin\AppData\Local\Temp\35D0.exe
C:\Users\Admin\AppData\Local\Temp\35D0.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
C:\Users\Admin\AppData\Local\Temp\368D.exe
C:\Users\Admin\AppData\Local\Temp\368D.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\37D6.bat" "
C:\Users\Admin\AppData\Local\Temp\3854.exe
C:\Users\Admin\AppData\Local\Temp\3854.exe
C:\Users\Admin\AppData\Local\Temp\38C2.exe
C:\Users\Admin\AppData\Local\Temp\38C2.exe
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
C:\Users\Admin\AppData\Local\Temp\39BD.exe
C:\Users\Admin\AppData\Local\Temp\39BD.exe
C:\Users\Admin\AppData\Local\Temp\3C2F.exe
C:\Users\Admin\AppData\Local\Temp\3C2F.exe
C:\Users\Admin\AppData\Local\Temp\3DD6.exe
C:\Users\Admin\AppData\Local\Temp\3DD6.exe
C:\Users\Admin\AppData\Local\Temp\3FAC.exe
C:\Users\Admin\AppData\Local\Temp\3FAC.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
C:\Users\Admin\AppData\Local\Temp\4913.exe
C:\Users\Admin\AppData\Local\Temp\4913.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
C:\Users\Admin\AppData\Local\Temp\59FD.exe
C:\Users\Admin\AppData\Local\Temp\59FD.exe
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdeff146f8,0x7ffdeff14708,0x7ffdeff14718
C:\Users\Admin\AppData\Local\Temp\5559.exe
C:\Users\Admin\AppData\Local\Temp\5559.exe
C:\Users\Admin\AppData\Local\Temp\5C7F.exe
C:\Users\Admin\AppData\Local\Temp\5C7F.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
C:\Users\Admin\AppData\Local\Temp\629A.exe
C:\Users\Admin\AppData\Local\Temp\629A.exe
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeff146f8,0x7ffdeff14708,0x7ffdeff14718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\SysWOW64\cacls.exe
CACLS "explothe.exe" /P "Admin:N"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=3C2F.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeff146f8,0x7ffdeff14708,0x7ffdeff14718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,15334958379703700809,7301065802737901575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "oneetx.exe" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "oneetx.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "explothe.exe" /P "Admin:R" /E
C:\Windows\SysWOW64\cacls.exe
CACLS "..\207aa4515d" /P "Admin:N"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\fefffe8cea" /P "Admin:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\207aa4515d" /P "Admin:R" /E
C:\Windows\SysWOW64\cacls.exe
CACLS "..\fefffe8cea" /P "Admin:R" /E
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\B04E.exe
C:\Users\Admin\AppData\Local\Temp\B04E.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=3C2F.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeff146f8,0x7ffdeff14708,0x7ffdeff14718
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\system32\cmd.exe
C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
C:\Windows\system32\netsh.exe
netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
C:\Windows\rss\csrss.exe
C:\Windows\rss\csrss.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\SYSTEM32\schtasks.exe
schtasks /delete /tn ScheduledUpdate /f
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -nologo -noprofile
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
C:\Windows\SYSTEM32\schtasks.exe
schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
C:\Windows\windefender.exe
"C:\Windows\windefender.exe"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\SysWOW64\sc.exe
sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
C:\Windows\windefender.exe
C:\Windows\windefender.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| RU | 5.42.92.88:80 | 5.42.92.88 | tcp |
| US | 8.8.8.8:53 | 88.92.42.5.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| FI | 77.91.124.55:19071 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 113.208.253.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| FI | 77.91.68.29:80 | 77.91.68.29 | tcp |
| US | 8.8.8.8:53 | 29.68.91.77.in-addr.arpa | udp |
| RU | 5.42.92.88:80 | 5.42.92.88 | tcp |
| FI | 77.91.68.52:80 | 77.91.68.52 | tcp |
| US | 8.8.8.8:53 | 52.68.91.77.in-addr.arpa | udp |
| TR | 185.216.70.222:80 | 185.216.70.222 | tcp |
| US | 8.8.8.8:53 | 222.70.216.185.in-addr.arpa | udp |
| BG | 171.22.28.213:80 | 171.22.28.213 | tcp |
| US | 8.8.8.8:53 | 213.28.22.171.in-addr.arpa | udp |
| RU | 5.42.65.80:80 | 5.42.65.80 | tcp |
| US | 8.8.8.8:53 | 80.65.42.5.in-addr.arpa | udp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| IT | 185.196.9.65:80 | tcp | |
| NL | 85.209.176.128:80 | tcp | |
| US | 8.8.8.8:53 | 65.9.196.185.in-addr.arpa | udp |
| FI | 77.91.124.71:4341 | tcp | |
| US | 8.8.8.8:53 | 71.124.91.77.in-addr.arpa | udp |
| FI | 77.91.124.1:80 | 77.91.124.1 | tcp |
| US | 8.8.8.8:53 | 1.124.91.77.in-addr.arpa | udp |
| TR | 185.216.70.238:37515 | tcp | |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.67.143:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | www.facebook.com | udp |
| NL | 157.240.201.35:443 | www.facebook.com | tcp |
| US | 8.8.8.8:53 | 238.70.216.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 143.67.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.201.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | accounts.google.com | udp |
| NL | 142.250.179.141:443 | accounts.google.com | tcp |
| NL | 142.250.179.141:443 | accounts.google.com | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 141.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | learn.microsoft.com | udp |
| NL | 104.85.2.139:443 | learn.microsoft.com | tcp |
| US | 8.8.8.8:53 | api.ip.sb | udp |
| US | 8.8.8.8:53 | 195.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.225.21.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 131.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | h2o.activebuy.top | udp |
| FI | 95.217.243.178:8443 | h2o.activebuy.top | tcp |
| US | 172.67.75.172:443 | api.ip.sb | tcp |
| RU | 5.42.65.80:80 | 5.42.65.80 | tcp |
| US | 8.8.8.8:53 | 139.2.85.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 178.243.217.95.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.75.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | wcpstatic.microsoft.com | udp |
| US | 8.8.8.8:53 | js.monitor.azure.com | udp |
| US | 13.107.246.67:443 | js.monitor.azure.com | tcp |
| US | 13.107.246.67:443 | js.monitor.azure.com | tcp |
| US | 8.8.8.8:53 | mscom.demdex.net | udp |
| IE | 54.76.136.163:443 | mscom.demdex.net | tcp |
| US | 8.8.8.8:53 | 67.246.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 163.136.76.54.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | hellouts.fun | udp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 8.8.8.8:53 | target.microsoft.com | udp |
| US | 8.8.8.8:53 | microsoftmscompoc.tt.omtrdc.net | udp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.68.29:80 | 77.91.68.29 | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 8.8.8.8:53 | 112.208.253.8.in-addr.arpa | udp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| NL | 85.209.176.128:80 | tcp | |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 188.114.96.0:80 | hellouts.fun | tcp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.1:80 | 77.91.124.1 | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| NL | 85.209.176.128:80 | tcp | |
| US | 8.8.8.8:53 | cb8ccb3d-cc70-42c3-9b23-5baaa889f590.uuid.statsexplorer.org | udp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| NL | 85.209.176.128:80 | tcp | |
| US | 8.8.8.8:53 | server4.statsexplorer.org | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 8.8.8.8:53 | stun.sipgate.net | udp |
| US | 162.159.130.233:443 | cdn.discordapp.com | tcp |
| BG | 185.82.216.108:443 | server4.statsexplorer.org | tcp |
| US | 8.8.8.8:53 | walkinglate.com | udp |
| US | 188.114.97.0:443 | walkinglate.com | tcp |
| US | 8.8.8.8:53 | 233.130.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.216.82.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.97.114.188.in-addr.arpa | udp |
| US | 15.197.250.192:3478 | stun.sipgate.net | udp |
| US | 8.8.8.8:53 | 192.250.197.15.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 89.65.42.20.in-addr.arpa | udp |
| BG | 185.82.216.108:443 | server4.statsexplorer.org | tcp |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp | |
| FI | 77.91.124.55:19071 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ec3DM74.exe
| MD5 | a00f9a2c82390f168130cc6dfa079f0c |
| SHA1 | 9438a8e53411cd4a5ea6da379c2eab09da5be477 |
| SHA256 | 1234726c01d0a13bc1bd5393d1d38663dc66a16edf7aa534fba77f0dd0bbfa97 |
| SHA512 | 80698fe96cd53d5c8ff3c6d1a84cfbb3e1f32e3ddb1f4b92bfbf7e6956020f9d3800cccfa23d2eb52b13d8115cc95b30f39b8e391fc94d918e0828e56da20942 |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Gy9YF69.exe
| MD5 | 0711e23d2902f70311f03cc4a658362a |
| SHA1 | 801d9c530001ccbb756b09976d2e53ee103deb5a |
| SHA256 | 129fc7deea5ab9985c016ed6882e2c5c1f4ef971580862b68fafb0cfe387ee47 |
| SHA512 | 4c0c90d93edd2be0d8cf20e060f3751207d306b9f17d0c3986102c1884d1c9fd4e5d4b168c1f74fb3c6a4b7462a162a2c048173c8b78d073728d1747323cb65b |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox9BM04.exe
| MD5 | 2906b648aa74d9ee2158ae7a05f3c998 |
| SHA1 | d22c0c06d7bba6ad9f09a357a62f6b08c3119cdc |
| SHA256 | 6820089fa08404c0012d77bcd6831a6523abbf7f73c2c62f265d2252cc670654 |
| SHA512 | 2b4fc4b72af1fecc58ee8d6f63e9a247f4c4d381a24a028618d782c4ef27981390802838dbb7e59f789e20788dd3c3d73b2553b92783fd6bd95e987f28c67995 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\gN7fp67.exe
| MD5 | 86edb7b4b9fda4ced8cc7a2e96525847 |
| SHA1 | 0f35688f1ffe04ab1a5da7c92418e22f01ab3f55 |
| SHA256 | 13b4d46a5627a34c5ad2eac02c2becc7249b69ad6b7031b41eb74bee3cb249fe |
| SHA512 | c90dab3a185911b59f43141f49e667ab00609620a0c514afb25fbe7ba86b434b86899ccf6b463c5c9fac7faa2c686011985b0d4788ab6caf20776f3074a925b0 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1tc84Sk1.exe
| MD5 | 0872390899641b50277109bbeec508e2 |
| SHA1 | 3a0db4a7e28c71e4edec14dcd3bd9d1790e373ae |
| SHA256 | 101d569b1c74a07fa3bc1652c0eb4123bd81438f0b4437fd1ebcc3ee889b0af5 |
| SHA512 | 06e54a9a61244b1b91e7928ab384f9d77bab64d5915e7e4ae39cfbf35cd92ae01a0f08fcddb851dc3e6e06d024afbcee68407f43097ada71e26cfb0429b54716 |
memory/60-35-0x0000000000400000-0x000000000040A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2lQ9351.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
memory/60-39-0x0000000074010000-0x00000000747C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3pI47ZV.exe
| MD5 | 3812c32bc06f844ed8903c3dd64d8e29 |
| SHA1 | 994ead20411563f43d192dc3cda353b85c1a2265 |
| SHA256 | f0ead75bb018650d3569352e082959cc3d035022fe5e7fa185765f250d27c549 |
| SHA512 | 7a956ab2f6b0dc98cf1f6877e01af983cb2608605137b5dd348988d4dbc0ef182ac37bf00dbced0a14cca2dc5080b2cdddf0d8535321a7123769e7d0f8577420 |
memory/4964-43-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
memory/4964-47-0x0000000000400000-0x0000000000409000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4mJ794pk.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
memory/3396-48-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/3396-49-0x0000000000C70000-0x0000000000CAE000-memory.dmp
memory/3396-50-0x0000000007EB0000-0x0000000008454000-memory.dmp
memory/3396-51-0x00000000079F0000-0x0000000007A82000-memory.dmp
memory/3396-52-0x0000000007B80000-0x0000000007B90000-memory.dmp
memory/3396-53-0x0000000007AF0000-0x0000000007AFA000-memory.dmp
memory/3396-54-0x0000000008A80000-0x0000000009098000-memory.dmp
memory/60-55-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/3396-56-0x0000000008570000-0x000000000867A000-memory.dmp
memory/3396-57-0x0000000007E10000-0x0000000007E22000-memory.dmp
memory/3396-58-0x0000000007E70000-0x0000000007EAC000-memory.dmp
memory/3396-59-0x0000000008460000-0x00000000084AC000-memory.dmp
memory/3204-60-0x00000000028D0000-0x00000000028E6000-memory.dmp
memory/4964-61-0x0000000000400000-0x0000000000409000-memory.dmp
memory/60-65-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/3396-66-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/3396-67-0x0000000007B80000-0x0000000007B90000-memory.dmp
memory/3204-68-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-69-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-70-0x0000000002DD0000-0x0000000002DE0000-memory.dmp
memory/3204-71-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-72-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-73-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-74-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-75-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-77-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-76-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-79-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-80-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-81-0x0000000007310000-0x0000000007320000-memory.dmp
memory/3204-82-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-83-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-84-0x0000000007310000-0x0000000007320000-memory.dmp
memory/3204-85-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-87-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-86-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-89-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-91-0x0000000002DD0000-0x0000000002DE0000-memory.dmp
memory/3204-90-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-94-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-93-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-95-0x0000000007310000-0x0000000007320000-memory.dmp
memory/3204-96-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-99-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-98-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-97-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-100-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-102-0x00000000029F0000-0x0000000002A00000-memory.dmp
memory/3204-103-0x00000000029F0000-0x0000000002A00000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\35D0.exe
| MD5 | 8ac0b2b62cec4ec1a135c39d1287a00d |
| SHA1 | dd5b06aeaa6f01c3939b45167bc77763801ac1e0 |
| SHA256 | d38e0dd3fd6479789dc060303ab12e438463560f2b555e73dabfe1c4a350ceea |
| SHA512 | 62f38da3ebc2b64118984d07d31a3a9f48e34be437414fec16f01671cd4b8b666054d2fadadd41247363c540f6836756efbd05d5b7b0f2130ce473f7903919f7 |
C:\Users\Admin\AppData\Local\Temp\35D0.exe
| MD5 | 8ac0b2b62cec4ec1a135c39d1287a00d |
| SHA1 | dd5b06aeaa6f01c3939b45167bc77763801ac1e0 |
| SHA256 | d38e0dd3fd6479789dc060303ab12e438463560f2b555e73dabfe1c4a350ceea |
| SHA512 | 62f38da3ebc2b64118984d07d31a3a9f48e34be437414fec16f01671cd4b8b666054d2fadadd41247363c540f6836756efbd05d5b7b0f2130ce473f7903919f7 |
C:\Users\Admin\AppData\Local\Temp\368D.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\368D.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
C:\Users\Admin\AppData\Local\Temp\368D.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\LW4DP8ED.exe
| MD5 | ae590e9387b975d166305ad3f7d927f7 |
| SHA1 | 1821ca8bddcded82b0b59073db71a04c248e204f |
| SHA256 | c66efcf8bc6f2c3264e67d92eddd97b7efaba329ca0981ec5220550baae966db |
| SHA512 | 415529e28bade505b9040e7553904e9cc469d0f2a96feeaad5a93d679746a48006cae430e56d5f89a6e696d8e5ad230cbd57d0d35a88820fe0cb6fd022d88ca5 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ph5oP9Sw.exe
| MD5 | 564089ba58f2288d7368c436cc41366f |
| SHA1 | 27b82430866eb66d2f4dd7b9cd3357240be2ec22 |
| SHA256 | 0f51f19cb91006076c316d55a9fda2cbebb893e607cb79a5a349ac7e254cd044 |
| SHA512 | 9f10af4708f11c17baf57ba3749862ba663ccffa6db5f6f255e4e4e78ea0ca89803e499b23d0b4e14f4784a4794c7cf99b4ea288f0ba30b635e9f09151bfb587 |
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\4rj187su.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\3854.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\3854.exe
| MD5 | 8905918bd7e4f4aeda3a804d81f9ee40 |
| SHA1 | 3c488a81539116085a1c22df26085f798f7202c8 |
| SHA256 | 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde |
| SHA512 | 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56 |
C:\Users\Admin\AppData\Local\Temp\37D6.bat
| MD5 | 403991c4d18ac84521ba17f264fa79f2 |
| SHA1 | 850cc068de0963854b0fe8f485d951072474fd45 |
| SHA256 | ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f |
| SHA512 | a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576 |
C:\Users\Admin\AppData\Local\Temp\38C2.exe
| MD5 | 425e2a994509280a8c1e2812dfaad929 |
| SHA1 | 4d5eff2fb3835b761e2516a873b537cbaacea1fe |
| SHA256 | 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a |
| SHA512 | 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0 |
C:\Users\Admin\AppData\Local\Temp\38C2.exe
| MD5 | 425e2a994509280a8c1e2812dfaad929 |
| SHA1 | 4d5eff2fb3835b761e2516a873b537cbaacea1fe |
| SHA256 | 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a |
| SHA512 | 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0 |
memory/4200-147-0x0000000074010000-0x00000000747C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\FL1tt5CG.exe
| MD5 | 777e05cf6973c28866c5a80ff96de56b |
| SHA1 | 4fb7c8c53693315db25cdb9acd621e9cbd0a253a |
| SHA256 | ad7a520925ecec658d0ad7d03cdcd302f7e7e8a08779cfb5b47260e086844867 |
| SHA512 | 7ed9e4b9006863aeb992fd3d74d1385b8fa9a1bede5b29ad7972c1824d127811acaca235d5a70b6d2345edd648fb34c90875f563a92450913e725ca381314d67 |
C:\Users\Admin\AppData\Local\Temp\39BD.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
C:\Users\Admin\AppData\Local\Temp\39BD.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
memory/4368-157-0x0000000002460000-0x0000000002480000-memory.dmp
memory/4368-160-0x0000000074010000-0x00000000747C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3C2F.exe
| MD5 | b9fbf1ffd7f18fa178219df9e5a4d7f9 |
| SHA1 | be2d63df44dbbb754fc972e18adf9d56a1adcce4 |
| SHA256 | 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f |
| SHA512 | ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8 |
memory/4368-168-0x0000000004C20000-0x0000000004C30000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
memory/4200-180-0x0000000005650000-0x0000000005660000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3DD6.exe
| MD5 | 7f28547a6060699461824f75c96feaeb |
| SHA1 | 744195a7d3ef1aa32dcb99d15f73e26a20813259 |
| SHA256 | ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff |
| SHA512 | eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239 |
C:\Users\Admin\AppData\Local\Temp\3FAC.exe
| MD5 | 20e21e63bb7a95492aec18de6aa85ab9 |
| SHA1 | 6cbf2079a42d86bf155c06c7ad5360c539c02b15 |
| SHA256 | 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17 |
| SHA512 | 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33 |
memory/4368-183-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-185-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\1td63US0.exe
| MD5 | 53e28e07671d832a65fbfe3aa38b6678 |
| SHA1 | 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1 |
| SHA256 | 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e |
| SHA512 | 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9 |
memory/4368-173-0x0000000002640000-0x000000000265E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
C:\Users\Admin\AppData\Local\Temp\3FAC.exe
| MD5 | 20e21e63bb7a95492aec18de6aa85ab9 |
| SHA1 | 6cbf2079a42d86bf155c06c7ad5360c539c02b15 |
| SHA256 | 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17 |
| SHA512 | 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33 |
memory/4368-189-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-164-0x0000000004C20000-0x0000000004C30000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\KZ7vw3oF.exe
| MD5 | 57911c75eb52cb99cbeee39928c5c164 |
| SHA1 | 9de8be36e7241dce7273e2c5dc7eea5f2bbe668d |
| SHA256 | ff775057d097e2f81ea19f018b201dc94842060a736a3903399c411920f98b09 |
| SHA512 | 594c30ca309042dbe10fa25092601db85b5699a51d752a5d8021bbc10a7cf48959e2febbbe99164304397f53e54855d439f2c61e4133090c334b91e00d5fc9ea |
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
| MD5 | 8168043e69418c65cbdf38ce1d462949 |
| SHA1 | 3ee8d1faaeb9dce98115ef4f1ae7b4e2cbc8559b |
| SHA256 | 75b944f330f3e224dc24d83e6a79831f821830ac64cd022bf69321d7990bcd4b |
| SHA512 | 0a34f69be48d37ddc286b8453081719909cf34f6ee4309e7cec3c504372f13fec84e4155d9dbb33447d4309b56dfdd387cd0ee102fc76c0bdb53030f11f624ee |
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\2Rq757cZ.exe
| MD5 | 8168043e69418c65cbdf38ce1d462949 |
| SHA1 | 3ee8d1faaeb9dce98115ef4f1ae7b4e2cbc8559b |
| SHA256 | 75b944f330f3e224dc24d83e6a79831f821830ac64cd022bf69321d7990bcd4b |
| SHA512 | 0a34f69be48d37ddc286b8453081719909cf34f6ee4309e7cec3c504372f13fec84e4155d9dbb33447d4309b56dfdd387cd0ee102fc76c0bdb53030f11f624ee |
memory/4368-194-0x0000000002640000-0x0000000002658000-memory.dmp
memory/764-196-0x00000000005A0000-0x00000000005FA000-memory.dmp
memory/4368-198-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3DD6.exe
| MD5 | 7f28547a6060699461824f75c96feaeb |
| SHA1 | 744195a7d3ef1aa32dcb99d15f73e26a20813259 |
| SHA256 | ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff |
| SHA512 | eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239 |
memory/4544-200-0x0000000000150000-0x000000000018E000-memory.dmp
memory/4368-203-0x0000000002640000-0x0000000002658000-memory.dmp
memory/1460-202-0x0000000000080000-0x000000000009E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\3C2F.exe
| MD5 | b9fbf1ffd7f18fa178219df9e5a4d7f9 |
| SHA1 | be2d63df44dbbb754fc972e18adf9d56a1adcce4 |
| SHA256 | 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f |
| SHA512 | ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8 |
memory/764-201-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/4368-210-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-214-0x0000000002640000-0x0000000002658000-memory.dmp
memory/764-221-0x0000000007610000-0x0000000007620000-memory.dmp
memory/4368-219-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
memory/3068-226-0x0000000000400000-0x0000000000470000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
| MD5 | 4bd59a6b3207f99fc3435baf3c22bc4e |
| SHA1 | ae90587beed289f177f4143a8380ba27109d0a6f |
| SHA256 | 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236 |
| SHA512 | ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324 |
memory/3068-229-0x00000000020E0000-0x000000000213A000-memory.dmp
memory/4368-232-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4913.exe
| MD5 | a8eb605b301ac27461ce89d51a4d73ce |
| SHA1 | f3e2120787f20577963189b711567cc5d7b19d4e |
| SHA256 | 7ed107b061c998c5c5c69d16282f63a64f65d46656cad2b98320ed3303b9fe61 |
| SHA512 | 372fbba38af7f4d571e8c22c773057e472ade25892268dc071cbfa0b18ebbf867c366f691033ad375f304b4d05735925c82bb1f82bc45e53400b31497813be6a |
memory/4368-227-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-223-0x0000000002640000-0x0000000002658000-memory.dmp
memory/1460-218-0x0000000074010000-0x00000000747C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\4913.exe
| MD5 | a8eb605b301ac27461ce89d51a4d73ce |
| SHA1 | f3e2120787f20577963189b711567cc5d7b19d4e |
| SHA256 | 7ed107b061c998c5c5c69d16282f63a64f65d46656cad2b98320ed3303b9fe61 |
| SHA512 | 372fbba38af7f4d571e8c22c773057e472ade25892268dc071cbfa0b18ebbf867c366f691033ad375f304b4d05735925c82bb1f82bc45e53400b31497813be6a |
memory/4544-211-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/1460-235-0x00000000048E0000-0x00000000048F0000-memory.dmp
memory/4368-238-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-240-0x0000000002640000-0x0000000002658000-memory.dmp
memory/4368-243-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5559.exe
| MD5 | 5678c3a93dafcd5ba94fd33528c62276 |
| SHA1 | 8cdd901481b7080e85b6c25c18226a005edfdb74 |
| SHA256 | 2d620c7feb27b4866579c6156df1ec547bfc22ad0aef00752ea8c6b083b8b73d |
| SHA512 | b0af8a06202a7626f750a969b3ed123da032df9a960f5071cb45e53160750acff926a40c3802f2520ccae4b08f4ea5e6b50107c84fe991f2104371998afef4b7 |
memory/4368-248-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5559.exe
| MD5 | 5678c3a93dafcd5ba94fd33528c62276 |
| SHA1 | 8cdd901481b7080e85b6c25c18226a005edfdb74 |
| SHA256 | 2d620c7feb27b4866579c6156df1ec547bfc22ad0aef00752ea8c6b083b8b73d |
| SHA512 | b0af8a06202a7626f750a969b3ed123da032df9a960f5071cb45e53160750acff926a40c3802f2520ccae4b08f4ea5e6b50107c84fe991f2104371998afef4b7 |
memory/4140-249-0x0000000000590000-0x00000000009E8000-memory.dmp
memory/4200-251-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/4368-253-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/4368-252-0x0000000002640000-0x0000000002658000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\59FD.exe
| MD5 | 42d97769a8cfdfedac8e03f6903e076b |
| SHA1 | 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe |
| SHA256 | f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b |
| SHA512 | 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77 |
memory/4140-258-0x0000000074010000-0x00000000747C0000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5C7F.exe
| MD5 | 395e28e36c665acf5f85f7c4c6363296 |
| SHA1 | cd96607e18326979de9de8d6f5bab2d4b176f9fb |
| SHA256 | 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa |
| SHA512 | 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de |
memory/4368-263-0x0000000004C20000-0x0000000004C30000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\59FD.exe
| MD5 | 42d97769a8cfdfedac8e03f6903e076b |
| SHA1 | 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe |
| SHA256 | f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b |
| SHA512 | 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77 |
memory/2936-265-0x0000000000160000-0x000000000019E000-memory.dmp
memory/4368-264-0x0000000004C20000-0x0000000004C30000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\5C7F.exe
| MD5 | 395e28e36c665acf5f85f7c4c6363296 |
| SHA1 | cd96607e18326979de9de8d6f5bab2d4b176f9fb |
| SHA256 | 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa |
| SHA512 | 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de |
memory/4300-270-0x0000000000E20000-0x0000000000F3B000-memory.dmp
memory/764-273-0x0000000007F30000-0x0000000007F96000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 81e4fc7bd0ee078ccae9523fa5cb17a3 |
| SHA1 | 4d25ca2e8357dc2688477b45247d02a3967c98a4 |
| SHA256 | c867c3bda7b6f6bd228a4d7656c069bd6cf4f67ba4b075cf4113f5b109e7d9ee |
| SHA512 | 4cfc68d7450ecdeaa56db50297bd233857b8a92265f57bfadb33ab9eb8bafbd77d8db609f8419a48f20ba0e7f8ad62063fd338536cd6319d1ed830405100ed22 |
memory/2936-280-0x0000000074010000-0x00000000747C0000-memory.dmp
memory/4300-279-0x0000000000E20000-0x0000000000F3B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\629A.exe
| MD5 | d5752c23e575b5a1a1cc20892462634a |
| SHA1 | 132e347a010ea0c809844a4d90bcc0414a11da3f |
| SHA256 | c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb |
| SHA512 | ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8 |
C:\Users\Admin\AppData\Local\Temp\629A.exe
| MD5 | d5752c23e575b5a1a1cc20892462634a |
| SHA1 | 132e347a010ea0c809844a4d90bcc0414a11da3f |
| SHA256 | c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb |
| SHA512 | ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 81e4fc7bd0ee078ccae9523fa5cb17a3 |
| SHA1 | 4d25ca2e8357dc2688477b45247d02a3967c98a4 |
| SHA256 | c867c3bda7b6f6bd228a4d7656c069bd6cf4f67ba4b075cf4113f5b109e7d9ee |
| SHA512 | 4cfc68d7450ecdeaa56db50297bd233857b8a92265f57bfadb33ab9eb8bafbd77d8db609f8419a48f20ba0e7f8ad62063fd338536cd6319d1ed830405100ed22 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 3d8f4eadb68a3e3d1bf2fa3006af5510 |
| SHA1 | d5d8239ec8a3bf5dadf52360350251d90d9e0142 |
| SHA256 | 85a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c |
| SHA512 | 554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554 |
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
| MD5 | a64a886a695ed5fb9273e73241fec2f7 |
| SHA1 | 363244ca05027c5beb938562df5b525a2428b405 |
| SHA256 | 563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144 |
| SHA512 | 122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474 |
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe
| MD5 | 81e4fc7bd0ee078ccae9523fa5cb17a3 |
| SHA1 | 4d25ca2e8357dc2688477b45247d02a3967c98a4 |
| SHA256 | c867c3bda7b6f6bd228a4d7656c069bd6cf4f67ba4b075cf4113f5b109e7d9ee |
| SHA512 | 4cfc68d7450ecdeaa56db50297bd233857b8a92265f57bfadb33ab9eb8bafbd77d8db609f8419a48f20ba0e7f8ad62063fd338536cd6319d1ed830405100ed22 |
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
| MD5 | a64a886a695ed5fb9273e73241fec2f7 |
| SHA1 | 363244ca05027c5beb938562df5b525a2428b405 |
| SHA256 | 563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144 |
| SHA512 | 122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474 |
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
| MD5 | a64a886a695ed5fb9273e73241fec2f7 |
| SHA1 | 363244ca05027c5beb938562df5b525a2428b405 |
| SHA256 | 563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144 |
| SHA512 | 122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474 |
memory/4408-282-0x00000000001C0000-0x00000000001DE000-memory.dmp
\??\pipe\LOCAL\crashpad_5068_VLZIVVFWTOQRCCFH
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
| MD5 | a64a886a695ed5fb9273e73241fec2f7 |
| SHA1 | 363244ca05027c5beb938562df5b525a2428b405 |
| SHA256 | 563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144 |
| SHA512 | 122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | b91dc8f5cbb0cf82e46c560efdae83a0 |
| SHA1 | f7377d0eeb20fc53601feeed1ea2fa9fbb4926d1 |
| SHA256 | 38d80e4ca9a1474ab2afacd008088a74d89eec24071b925de5237f91f7908a44 |
| SHA512 | 9a19088297a68b8296a6255f339bd471b939d3b5e052fc5b617cc37db4f80037807ba7c5b3b2bef7e652dd3eed6d894ca3f251b6987b49ce5424c2ea3d490f54 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | cffcfdb6e12ddce5e5a37f97363b9f92 |
| SHA1 | e9b7ca9b46d24aaf5d084b90946718f078e1c752 |
| SHA256 | c995c227459a82c8a52670a24e0083e09210afcc3028050e869ecf914e2c6908 |
| SHA512 | ee86f23b4200973b8fa5c5f2608a4fdc265bf6a8633f46dff0eb28fc7376dee408434e591d29a9bb388590e341dbf1fda4604452e537fc1aa02d3813f844ac3d |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | e9dc6da54d2165276f17a24217f0e811 |
| SHA1 | 8d61cf5445f6616c667d90bf7c2033407eab3d67 |
| SHA256 | cdd73a51ca2b435ce74bda40384aebfaacb08db0735fb8141a812f8a56a1a723 |
| SHA512 | b1e97352a0d367b73824d6a1281bfe7ecdb1b27be65fb3a20bf6a0d69b93634e9945c02726bcd809c73a27f96f04fadea0d9c22f8642d48b8e056a62568b4433 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
| MD5 | d985875547ce8936a14b00d1e571365f |
| SHA1 | 040d8e5bd318357941fca03b49f66a1470824cb3 |
| SHA256 | 8455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf |
| SHA512 | ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38 |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_evjd5sl4.jhh.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
| MD5 | a5b509a3fb95cc3c8d89cd39fc2a30fb |
| SHA1 | 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c |
| SHA256 | 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529 |
| SHA512 | 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9 |
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
| MD5 | e913b0d252d36f7c9b71268df4f634fb |
| SHA1 | 5ac70d8793712bcd8ede477071146bbb42d3f018 |
| SHA256 | 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da |
| SHA512 | 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4 |