Analysis
-
max time kernel
122s -
max time network
308s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
05-02-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe
Resource
win10-20231215-en
General
-
Target
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe
-
Size
238KB
-
MD5
8c20d9745afb54a1b59131314c15d61c
-
SHA1
1975f997e2db1e487c1caf570263a6a3ba135958
-
SHA256
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
-
SHA512
580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
SSDEEP
3072:ZWTAKLhXk2EYjcc9ct9cccX83bNryx6mshaIX7x5XIJG:lKL9EYjF9JccM3RdLwc3I
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
@logscloudyt_bot
185.172.128.33:8924
Extracted
redline
@oni912
45.15.156.209:40481
Extracted
redline
@oleh_ps
185.172.128.33:8924
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral2/memory/436-76-0x0000000000470000-0x00000000004A0000-memory.dmp family_vidar_v7 behavioral2/memory/3856-77-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3856-80-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3856-81-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/3856-108-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\87EB.exe family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\87EB.exe family_zgrat_v1 behavioral2/memory/676-137-0x00000000003E0000-0x0000000000938000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_zgrat_v1 C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_zgrat_v1 -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral2/memory/1408-28-0x0000000002210000-0x000000000232B000-memory.dmp family_djvu behavioral2/memory/3592-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3592-31-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3592-32-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3592-33-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3592-45-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-51-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-58-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-59-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-65-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-63-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-66-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-82-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/428-91-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 10 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe family_redline behavioral2/memory/1880-183-0x0000000000E20000-0x0000000000E74000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000007001\sadsadsadsa.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 150 5368 rundll32.exe 170 5404 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000\Control Panel\International\Geo\Nation fu.exe -
Deletes itself 1 IoCs
Processes:
pid process 3324 -
Drops startup file 1 IoCs
Processes:
STAR.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe STAR.exe -
Executes dropped EXE 36 IoCs
Processes:
EA02.exe924.exe924.exe924.exe924.exebuild2.exebuild2.exebuild3.exebuild3.exe75E9.exe87EB.exe8F6E.exe97DB.exeSTAR.exebott.exeqemu-ga.exeexplorgu.exemstsca.exefu.exealex.exeRDX.exe55555.exeolehps.exeLogs.exe1233213123213.exesadsadsadsa.exegoldklassd.exelumma1234.exedayroc.exeInstallSetup9.exed21cbe21e38b385a41a68c5e6dd32f4c.exerty25.exeBroomSetup.exetoolspub1.exedaissss.exeleg221.exepid process 4892 EA02.exe 1408 924.exe 3592 924.exe 2896 924.exe 428 924.exe 436 build2.exe 3856 build2.exe 2432 build3.exe 3932 build3.exe 1328 75E9.exe 676 87EB.exe 4216 8F6E.exe 4868 97DB.exe 1040 STAR.exe 1880 bott.exe 5064 qemu-ga.exe 1236 explorgu.exe 4192 mstsca.exe 4844 fu.exe 4332 alex.exe 4692 RDX.exe 3840 55555.exe 5152 olehps.exe 5140 Logs.exe 5616 1233213123213.exe 5836 sadsadsadsa.exe 5540 goldklassd.exe 6052 lumma1234.exe 5724 dayroc.exe 5256 InstallSetup9.exe 5340 d21cbe21e38b385a41a68c5e6dd32f4c.exe 5412 rty25.exe 5180 BroomSetup.exe 5992 toolspub1.exe 5984 daissss.exe 6228 leg221.exe -
Loads dropped DLL 5 IoCs
Processes:
87EB.exerundll32.exerundll32.exerundll32.exeInstallSetup9.exepid process 676 87EB.exe 5172 rundll32.exe 5368 rundll32.exe 5404 rundll32.exe 5256 InstallSetup9.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
924.exeexplorgu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\d58bebc7-afb4-4c13-895c-e035eaecac33\\924.exe\" --AutoStart" 924.exe Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000\Software\Microsoft\Windows\CurrentVersion\Run\fu.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\fu.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 api.2ip.ua 26 api.2ip.ua 40 api.2ip.ua -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exe autoit_exe -
Drops file in System32 directory 64 IoCs
Processes:
1233213123213.exedescription ioc process File created C:\Windows\System32\CJ1i\WQl7Crwk\bjoM3\E5 1233213123213.exe File created C:\Windows\System32\qQ1azLm0\vSrGIYY9D79\JE\utsckphAO 1233213123213.exe File created C:\Windows\System32\R2DL\Td1JKS9\ZXnttCH\Xx2 1233213123213.exe File opened for modification C:\Windows\System32\RUXI4m6eivG\xZbt4l\KevJ1s968E\lGi 1233213123213.exe File opened for modification C:\Windows\System32\3FWAS\R3V 1233213123213.exe File opened for modification C:\Windows\System32\RruDFT\00i1TFBXh\fIQ 1233213123213.exe File opened for modification C:\Windows\System32\Zf3JRDWHrZC\Hys65VX\Jp6SrCQ8qP 1233213123213.exe File opened for modification C:\Windows\System32\MqHnhpPX\6h5\rHor\Tpg 1233213123213.exe File created C:\Windows\System32\ObCK4M\jU\MxB9 1233213123213.exe File created C:\Windows\System32\9kK\5ZjZ\kRqeBEMOJY 1233213123213.exe File created C:\Windows\System32\DifVuX6M\oXYfcaByv\74phg 1233213123213.exe File created C:\Windows\System32\2bYCzLmBg\xUL71FPa6Fa\rXYXH4x8\UoXIDHYV 1233213123213.exe File created C:\Windows\System32\QXLqne\2d5yBU 1233213123213.exe File opened for modification C:\Windows\System32\ZHwNMz\aZcZ9\iZOeq9G 1233213123213.exe File created C:\Windows\System32\lD1Ub28x\P7KXZlpTcg8\PtQbJI\4sZr 1233213123213.exe File opened for modification C:\Windows\System32\aZgJ8NKVS\UGkxWG\7TKsmk3J3\q3Uq 1233213123213.exe File opened for modification C:\Windows\System32\uVpW6\y3H\oJ8\nWa61d4M 1233213123213.exe File opened for modification C:\Windows\System32\XSk4D3zR\Xrg\EnrcSY\Zo 1233213123213.exe File opened for modification C:\Windows\System32\HLRyqsFlQI\NgeTaPTEjR\BMljc\A5r0sQT8CIX 1233213123213.exe File opened for modification C:\Windows\System32\qcl3\1vTR4IDc\lMDBCis 1233213123213.exe File opened for modification C:\Windows\System32\d6W0Pmm\11FLYDDH9J\KU7X0KoojVN 1233213123213.exe File created C:\Windows\System32\QlZc\T8pgv6qV\Omw7wWka\QM2upT1izu 1233213123213.exe File created C:\Windows\System32\RbNwCEAV\D6q0ljQk\fbPOuNa\EAeZaX 1233213123213.exe File opened for modification C:\Windows\System32\gaCFqH\y0f9dCzqsh9 1233213123213.exe File opened for modification C:\Windows\System32\2qGz2VwOv2\VGxjq4Z6e 1233213123213.exe File created C:\Windows\System32\RoHOG1C87Sz\4usqIySbbEL\XsIUCzX05NZ 1233213123213.exe File opened for modification C:\Windows\System32\FUr\Pw\Wq\oSe43iFf 1233213123213.exe File opened for modification C:\Windows\System32\gx\sl2\3Z8\pvd 1233213123213.exe File opened for modification C:\Windows\System32\nG5Tvo0\g2nD1kZzIgv\olp2by7D4\nEfbpRz57 1233213123213.exe File created C:\Windows\System32\HlyITcsQ\4i6y2E\Vg8z0w\8sOZ 1233213123213.exe File opened for modification C:\Windows\System32\GM\And72HViJnt\qHjMonH\uEjYRKbykDv 1233213123213.exe File opened for modification C:\Windows\System32\ull050Otk\WES\0QBQm4vNH1E 1233213123213.exe File created C:\Windows\System32\Hqs\jWypzpvZ\Ip9cK5aE 1233213123213.exe File created C:\Windows\System32\khd1p1\46OV9xa8vA\tFPzHN3xfsN\e5c 1233213123213.exe File opened for modification C:\Windows\System32\x526iepvD0\5FjLiqdLe\Fa5KKd02n 1233213123213.exe File created C:\Windows\System32\oYmu7wkk\WPVz4Wgz 1233213123213.exe File created C:\Windows\System32\pF\6Kijmk 1233213123213.exe File opened for modification C:\Windows\System32\VivO\mK\aNcu7Q\lpN 1233213123213.exe File opened for modification C:\Windows\System32\g4yCoa\pN\btPv\YMb0kh6 1233213123213.exe File opened for modification C:\Windows\System32\K6fz\WmGWYfX\I8 1233213123213.exe File created C:\Windows\System32\iirOuUAfZ\7BdUE 1233213123213.exe File opened for modification C:\Windows\System32\hSbU\AIxK\fHz3raVq68\pH5z4 1233213123213.exe File opened for modification C:\Windows\System32\px\L5G6v94bDBF\Mzixx7Pp 1233213123213.exe File created C:\Windows\System32\enyu1SJcc\0O\JelraGlKG\QH 1233213123213.exe File opened for modification C:\Windows\System32\5ZfD2d\onL2YznjtH\u2\xBOe28oM8vR 1233213123213.exe File created C:\Windows\System32\4dyiPc0bKjt\RiBv\QZvMIHpFLfP 1233213123213.exe File opened for modification C:\Windows\System32\ul\gacR3u9XUT\wyjXZNseez1\jBh5Z 1233213123213.exe File opened for modification C:\Windows\System32\TvDKipSq\ZTi 1233213123213.exe File created C:\Windows\System32\baNNgu4Ek\7pDKHvv8LXG\aEWDGwK 1233213123213.exe File created C:\Windows\System32\HH\yI\uJU4XGe4\kiP 1233213123213.exe File created C:\Windows\System32\ON6czL\jxNtAOgR 1233213123213.exe File opened for modification C:\Windows\System32\r9HS0bXCqha\yDUjcCED5\3V 1233213123213.exe File created C:\Windows\System32\6ipAIzb\XuSEywsGt\0h4k8PlM 1233213123213.exe File opened for modification C:\Windows\System32\mAH\fuPj3svA 1233213123213.exe File opened for modification C:\Windows\System32\9bhYQUSsApu\Ml\CC7vcXPw\ii6BkyQKsic 1233213123213.exe File opened for modification C:\Windows\System32\LnF\enYYuhJ\ZMZP8\B7 1233213123213.exe File created C:\Windows\System32\9PTnjUHDV\WXoaIKfEq 1233213123213.exe File created C:\Windows\System32\S8y1Glp\hSy 1233213123213.exe File opened for modification C:\Windows\System32\Cdbw\1Z02QmcmT\2hn9eYhS7q\kb94C 1233213123213.exe File opened for modification C:\Windows\System32\K5w6i2Qa\M5DIDkx\VLOi4NBoEEH 1233213123213.exe File opened for modification C:\Windows\System32\l05z9OFQ\3h0 1233213123213.exe File opened for modification C:\Windows\System32\RjSzOLN6\hgYbp2\rJWHYQl 1233213123213.exe File created C:\Windows\System32\2ZIz2It\lhICP40uy 1233213123213.exe File opened for modification C:\Windows\System32\XAO7C\4sNBX 1233213123213.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
97DB.exeexplorgu.exepid process 4868 97DB.exe 1236 explorgu.exe 1236 explorgu.exe 1236 explorgu.exe 1236 explorgu.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
924.exe924.exebuild2.exebuild3.exe8F6E.exe87EB.exealex.exegoldklassd.exelumma1234.exedescription pid process target process PID 1408 set thread context of 3592 1408 924.exe 924.exe PID 2896 set thread context of 428 2896 924.exe 924.exe PID 436 set thread context of 3856 436 build2.exe build2.exe PID 2432 set thread context of 3932 2432 build3.exe build3.exe PID 4216 set thread context of 3108 4216 8F6E.exe RegAsm.exe PID 676 set thread context of 520 676 87EB.exe MsBuild.exe PID 4332 set thread context of 1836 4332 alex.exe RegAsm.exe PID 5540 set thread context of 5236 5540 goldklassd.exe RegAsm.exe PID 6052 set thread context of 5608 6052 lumma1234.exe RegAsm.exe -
Drops file in Windows directory 7 IoCs
Processes:
97DB.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 97DB.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 6788 sc.exe 6564 sc.exe 6160 sc.exe 6324 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1204 3856 WerFault.exe build2.exe 1944 1328 WerFault.exe 75E9.exe 820 1328 WerFault.exe 75E9.exe 5036 520 WerFault.exe MsBuild.exe 500 520 WerFault.exe MsBuild.exe 5260 3840 WerFault.exe 55555.exe 5864 3840 WerFault.exe 55555.exe 5240 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 6088 5992 WerFault.exe toolspub1.exe 6492 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 5532 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 6916 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 4028 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 5636 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 6804 5340 WerFault.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe 6244 4840 WerFault.exe RegAsm.exe 7016 4964 WerFault.exe ceahuve -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
EA02.exetoolspub1.exea613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EA02.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EA02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EA02.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2444 schtasks.exe 532 schtasks.exe 6540 schtasks.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\m.facebook.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\facebook.com\NumberOfSubdoma = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\facebook.com\NumberOfSubdoma = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = cabd4e0af057da01 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 3ce2930af057da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\facebook.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\m.facebook.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{7B568CB5-E38E-4378-B598-C1347BFA0F90} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f4c02f0af057da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\facebook.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\facebook.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\m.facebook.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1526633464-1149972181-4216821683-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exepid process 520 a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe 520 a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 3324 -
Suspicious behavior: MapViewOfSection 11 IoCs
Processes:
a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exeEA02.exeMicrosoftEdgeCP.exe1233213123213.exepid process 520 a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe 4892 EA02.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 5616 1233213123213.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
STAR.exebott.exeRegAsm.exealex.exedescription pid process Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeDebugPrivilege 1040 STAR.exe Token: SeDebugPrivilege 1880 bott.exe Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeDebugPrivilege 3108 RegAsm.exe Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeShutdownPrivilege 3324 Token: SeCreatePagefilePrivilege 3324 Token: SeDebugPrivilege 4332 alex.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
Processes:
fu.exepid process 4844 fu.exe 3324 3324 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe -
Suspicious use of SendNotifyMessage 37 IoCs
Processes:
fu.exepid process 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe 4844 fu.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
97DB.exeexplorgu.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeBroomSetup.exepid process 4868 97DB.exe 1236 explorgu.exe 4864 MicrosoftEdge.exe 2184 MicrosoftEdgeCP.exe 4284 MicrosoftEdgeCP.exe 2184 MicrosoftEdgeCP.exe 5180 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
924.exe924.exe924.exe924.exebuild2.exebuild3.exebuild3.exedescription pid process target process PID 3324 wrote to memory of 4892 3324 EA02.exe PID 3324 wrote to memory of 4892 3324 EA02.exe PID 3324 wrote to memory of 4892 3324 EA02.exe PID 3324 wrote to memory of 1408 3324 924.exe PID 3324 wrote to memory of 1408 3324 924.exe PID 3324 wrote to memory of 1408 3324 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 1408 wrote to memory of 3592 1408 924.exe 924.exe PID 3592 wrote to memory of 2352 3592 924.exe icacls.exe PID 3592 wrote to memory of 2352 3592 924.exe icacls.exe PID 3592 wrote to memory of 2352 3592 924.exe icacls.exe PID 3592 wrote to memory of 2896 3592 924.exe 924.exe PID 3592 wrote to memory of 2896 3592 924.exe 924.exe PID 3592 wrote to memory of 2896 3592 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 2896 wrote to memory of 428 2896 924.exe 924.exe PID 428 wrote to memory of 436 428 924.exe build2.exe PID 428 wrote to memory of 436 428 924.exe build2.exe PID 428 wrote to memory of 436 428 924.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 436 wrote to memory of 3856 436 build2.exe build2.exe PID 428 wrote to memory of 2432 428 924.exe build3.exe PID 428 wrote to memory of 2432 428 924.exe build3.exe PID 428 wrote to memory of 2432 428 924.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 2432 wrote to memory of 3932 2432 build3.exe build3.exe PID 3932 wrote to memory of 2444 3932 build3.exe schtasks.exe PID 3932 wrote to memory of 2444 3932 build3.exe schtasks.exe PID 3932 wrote to memory of 2444 3932 build3.exe schtasks.exe PID 3324 wrote to memory of 1328 3324 75E9.exe PID 3324 wrote to memory of 1328 3324 75E9.exe PID 3324 wrote to memory of 1328 3324 75E9.exe PID 3324 wrote to memory of 676 3324 87EB.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe"C:\Users\Admin\AppData\Local\Temp\a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\EA02.exeC:\Users\Admin\AppData\Local\Temp\EA02.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\924.exeC:\Users\Admin\AppData\Local\Temp\924.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\924.exeC:\Users\Admin\AppData\Local\Temp\924.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d58bebc7-afb4-4c13-895c-e035eaecac33" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\924.exe"C:\Users\Admin\AppData\Local\Temp\924.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\924.exe"C:\Users\Admin\AppData\Local\Temp\924.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build2.exe"C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build2.exe"C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build2.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 18407⤵
- Program crash
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build3.exe"C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build3.exe"C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\75E9.exeC:\Users\Admin\AppData\Local\Temp\75E9.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 10762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 10282⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\87EB.exeC:\Users\Admin\AppData\Local\Temp\87EB.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 9843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 9643⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\8F6E.exeC:\Users\Admin\AppData\Local\Temp\8F6E.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\97DB.exeC:\Users\Admin\AppData\Local\Temp\97DB.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 31⤵
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵
-
C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000005001\55555.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\55555.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 9963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 10163⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000006001\1233213123213.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\1233213123213.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\526633464114_Desktop.zip' -CompressionLevel Optimal4⤵
-
C:\Users\Admin\AppData\Local\Temp\1000007001\sadsadsadsa.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\sadsadsadsa.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000008001\goldklassd.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\goldklassd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\1000009001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\lumma1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\1000010001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\dayroc.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\nsr6CEB.tmpC:\Users\Admin\AppData\Local\Temp\nsr6CEB.tmp4⤵
-
C:\Users\Admin\AppData\Local\Temp\nsr6CEB.tmpC:\Users\Admin\AppData\Local\Temp\nsr6CEB.tmp5⤵
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 3844⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 6644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 7004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 6724⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 6044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 7764⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5340 -s 7684⤵
- Program crash
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 4844⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000011001\daissss.exe"C:\Users\Admin\AppData\Local\Temp\1000011001\daissss.exe"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\1000019001\leg221.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\leg221.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000022001\pixxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\pixxxxx.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1000025001\mrk1234.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\mrk1234.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10844⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000026001\plaza.exe"C:\Users\Admin\AppData\Local\Temp\1000026001\plaza.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1000027001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\ladas.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1000028001\sehv.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\sehv.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1000029001\redline1234.exe"C:\Users\Admin\AppData\Local\Temp\1000029001\redline1234.exe"2⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "ACULXOBT"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "ACULXOBT" binpath= "C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "ACULXOBT"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\ProgramData\hlkwogclqprr\uwgxswmtctao.exeC:\ProgramData\hlkwogclqprr\uwgxswmtctao.exe1⤵
-
C:\Windows\explorer.exeexplorer.exe2⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Roaming\ceahuveC:\Users\Admin\AppData\Roaming\ceahuve1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 4762⤵
- Program crash
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1File and Directory Permissions Modification
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Are.docxFilesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5c59708a86e78530488f2356251e775a2
SHA117e33e077261cdd9e54d4e58dfb168f15ee93efb
SHA25671719971666e64a4f767e8f9d0b52e822189c4bfb1fe449a0e7c8066c82813c2
SHA51242afd4d2c791ea8cb239130cf4f4d43da0ec39c63049c56796e082282e2ba2f0cd0fd8934b7de3b359ca433b0609ad159fda6f92168168f2d4517f13fbbb3fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD57c8712a3c6f49c500005605da90df0c8
SHA1e82b0601fb67bacbf5c8b0a72dee85aec38f3d2a
SHA2561bb0e33519ab5a86f7087385570ba3cbb9bcb90a823e3b605e28aa3c26e4daa3
SHA51238a0433d0e20c749d4c03448f828c0990d369ebc823a2ad8c9d8afcced97ae06c6c0a2ffb43d193ae897842460b492fb4c03b9d31f891befb9dd56151160ab19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD58785516c9fac28d476f50f7effb5e0f0
SHA1c291c72625985b07ed5e78b93125f3889e69f027
SHA256f014c12426ec157decb9afab414c32cb8eb3e00d42daff421c8f203a5963ace0
SHA5122f5529b06029a834992a7d05b99f0035e2313897bd161d45c209fb259daedae95f5532a01714f07258604e2b25a136376a36ef48d1aa712dec605fd1f679f6c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IW2JT0EI\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\BJVUT4BN\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\N5TPZBA5\favicon[1].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PP2OB4K2\gB76kJXPYJV[1].pngFilesize
6KB
MD5389dfa18be34d8cf767e06fd5cde4ec6
SHA147b751cffab47d076816c63ce08d3e84600376ee
SHA2563c45ce612f41b1e7936e7cf5b235047344fd3146d1630e342f186d1d1e8e00d5
SHA512c4db18f636ad85e87f93a208fb4b02b528659ba367e51cfa6d7826ac1159f445a85fbca8d12ac67556e8fb5208dae24ae309e783d50feb088ef0e9f47ac19430
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\81ATF1JE.cookieFilesize
308B
MD5b182a1c65436bbc75925db142df1e2bb
SHA14b6850fd5b421992e5c623b5db82bff084d6ce0d
SHA256ae46f46ef48d2635e563f0e4f9735d53cd760139a57410b10ed7fcfb1b302dc2
SHA5125eafab50913cf87897e0183301bf71f32dd3433aeb02d0b08e7531e93b0ecb873d35249ccf9902a48adf648c3a67f53d991a51de32d05071fda0f6774478ec8c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_DDCF8A1BB8132E191B1D87188F0E5FF4Filesize
472B
MD5f2d0700bd7e9f92e1324ee651cb075b3
SHA16c44af9682dd9432fc80aa528997e529b73d2e4d
SHA2567b79e17d313fce604f772855084ff5106fe267533984e8bd523fd5c5575353d3
SHA5120584191262ada47d821ed6f0f70bad8b6f86f3ba85352d192bd7e4980c134c9d70cdb9fbbe54df324d48ad15dd95e969907d5c44f7adf9f33f5f9bf9c1844919
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD58620bf7c42bfe5e31c0ac26e82273066
SHA1971fbacffcf89b8793145376e26fe2c528452bea
SHA256577f654a0660290a3386c6010686fc8221861f3dda7bc857a1a938ae8885d1a4
SHA512a43f058e8bac76f8197a8bc636a46c2b3587b75c1910227d3fa44306c8c3e3bb2e712265b6d67b162059220ad476d86323754cf449faa44c776370fc6d2a8e4a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD539cf813b353b6d4f89a25d35e028a4f4
SHA12249f93fd1dccffaa3e9f1425d416def3241c547
SHA2562958f7aa0192e89d8120eebd2e949bfcb50f11e4e0387c4793deb38bfd2ef9eb
SHA5121b827eb0dc0c3524b2eb9a0fbb41a25ba45cd4890ff26d3ebcd2fa2f2b2f036c62e9a0c04ae8f5b15c8975c7086cea327541bb1747ce9b53c9786a20acd8e9a4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_DDCF8A1BB8132E191B1D87188F0E5FF4Filesize
410B
MD5ea834a0d02f156f88fbc4baaa9b775c4
SHA16d60b28b5d8d0c29d812648faa6d095dddd71c86
SHA2561bf82f59de8eceb967b2f3903bb9afb14cdc3b957a22dd739acac75e1cc88853
SHA5121f4ec22f891a071bcfbc3da0d0dc162c74cf515c80feff9f2e36430855e94440e22dab1eaef91d9389fcb6061f7bdcfd764ea04ac4853d4d2e0d52f1019ba2ea
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD51cea69a2f517850521e4f52288e06a34
SHA11aa4f34b12f8743e2b6ba8660292a05ddcb9d78d
SHA256bc71e178500ace64a3f4fa6c5b7fb73e629f5d301fcd5219c0f09101b3d5d516
SHA5126b7dae3e0f7cbf5a139877f6aa61f8d04111cba8d4cab1511cf5464ccdc02a3f2017e0f612734b38760031e163764bcdb5f8e1fb5df1fde59b758f89a59a4854
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD58174a2a290e82db80f35824e033d2ebc
SHA1ce7d504cb972647ecf0d64e97f566290da57a6aa
SHA256aff31398bb76bd81a1e18f6544384f0ec21dc9e601187e81e2b53bcceec70ccf
SHA512a0b00125ccc98c305481ce4b82b2de1f46b620cce64e143c26512d54b30d74cdb6d67ee9076095123b2dd7c9e1217c47e72bceaccc4170462b68efb177cce169
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeFilesize
280KB
MD5f103d58e096f58f714edfdd4fed607d9
SHA18d43cde3f6181eb605004e060fbe9f5b17766607
SHA256ed54f8bf99c21336009d466021754d2858c946b17541592305614677a9a85724
SHA512a57a3caadc755fc14ea698d7f9b4a8d8b1425b114626234caacaee2ce916868e55b9a14d785678255b0398c6bee1a34e5d50baa70b675ce32658bddeefe40bff
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeFilesize
138KB
MD5d4bb12960992a9bb354cf5eb5ce35589
SHA1213d0f81f2723d399b257271a4f20be8e8df022f
SHA25685991c51c7b8f6e18901ddce10a47e2786fe7b3099d361fd6de8a9a8738cefc9
SHA5127a12d77924055fdf37bc547a3c8dd703def3235c28e55b10595dfbb5c1b4e1dee133e87a6c298a0ae7219a876031d7652af2b54bb9f75bd83b05ac4d255d7378
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeFilesize
320KB
MD5e4b901ad8e0515757764ea2d3d1e99cc
SHA15aa3c8b07cf97f2b711e199f18f34473757e4f71
SHA256dc9842884e4945509d270b26d498a180076fa23015bb8732a4c62f954101ee9f
SHA51202dbb57240b5502e92086a913995e1d3dc36bb3722946c488facf946e0876bada47a372e63c263a0096843161f276a23a6014d98f9ac341cd08d253e0b911ab9
-
C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exeFilesize
75KB
MD54be9496dc3120a7caaa531bd65ab5437
SHA1c1e377aa386e7f823b2757ac488f05f33b88761b
SHA2564405554a326afad9657c818847781e5ea721b9bbcd23e25a7091e13899f11939
SHA5121efebff3332be01b7bfbf9c3f0b650d92695011335e220ae9ed1774a3d0ec1b38d2392ed346fca549e6b0ec7d6ada973a8f036746e7229589f6a8cc581b51f3f
-
C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exeFilesize
180KB
MD52e885dad4c0bad9feaeb2c64ea88c205
SHA188d1e84b4cd81d8e9ecdd96ec40a1ad6511a8e44
SHA2561184c6fb4500e66870f364cbd6ba007c0898b400f9bbd73796882b96f53d2926
SHA512d32587605c747712121440a143faa961cf6815375a146a0ad55f5c0b7b148aae4faec3daa1c8a837fb731d7cedda23d608ab90968d0088ad5de5b76e116e22ee
-
C:\Users\Admin\AppData\Local\Temp\1000002001\fu.exeFilesize
141KB
MD5dcfecaeca154c0c51498d9811284c726
SHA178b0a19c55cebd4c5bed3207543ab47e49b99c59
SHA2563b2ace49ca84dfbae3050b3852ee88f040ec62cb1c89b90a5fbe5f55b34a632b
SHA5122d82056a119ca31bdd2966a5093868442ed4abc82b30df454d915b69561cbd67bbbb4c844309e44863e7b81c021f2f9c9e9d4042337fb5c49245c7b30197953b
-
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exeFilesize
38KB
MD5f5414f52383b3359c4260d1ab027ff07
SHA14ecf763c18f0edd820cb00b1970b37f9c1734aa2
SHA25651f288b97e25c29c92ec8c71c8cb0bec17d12a5dcb0c0f73a65fdfee2c463825
SHA512c8eae1961cec88ffb52a4580b3c0d79ae5319fae579722c759c14153eb07c40c7409f5112130da0aa9112b413e4ee1bdb407466de977bfb2c6ac64ea9079cfcd
-
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exeFilesize
103KB
MD5ca21babaaf15f7f10057835617955294
SHA1d1693709cf13c6b71a9e9c15d537f3ddddcd574a
SHA256335c8406c222cff09c9f90c3995d564c270d2144d7515fef2097fd988ce9a384
SHA512694c596097a3984a075a26efaf5f4290fb181a8db192aa79e773f2316b6229e655077cdc22337dabf226504033a2f4f2065b084f71f79a1aba8a00f7e4daf50f
-
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exeFilesize
147KB
MD581aff844e57d4b881193eecd3bd8bdac
SHA1b80a94932b6272fcae6cf5685b901eed93791621
SHA2569a3d789230165e4bc2b6e4fae8380eaed09dac5a42701cbcb972395eb314abd0
SHA5127fa3979224947eaba02d0930c6ad2fbdca1b5daec2f73c6faf96b141a2f971cdb97a4566bd4f2d9c713217479adf2d3bdcd72a2e6d0efa681363b33edef27f73
-
C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exeFilesize
313KB
MD5f733785f9d088490b784d4dc5584ebfb
SHA16c073d4208fee7cc88a235a3759b586889b91adf
SHA256e7216d8b7084c0c36d90aefaf30bb7b6d10ae2ecae700889d459ed5ab1b26a59
SHA51243589b18333b0edcd6e300577f86de685058df5533bcbfdd3e30497aa76176008125fbd28deecaca5e6132c42cc5c0a583c34497f40dbe4ea577333eaebab899
-
C:\Users\Admin\AppData\Local\Temp\1000004001\RDX.exeFilesize
269KB
MD5459e8f4dae1a0850a1eb6ef023546af9
SHA11fd3f2c7a3d348cee81767ff3de2380ea767c573
SHA25666558b2112a018a9fb2ca2e558763a734f84217202777f8afa78d3a095da598d
SHA512f5c95ab0359c81f1b1231793f249d02f7ca19b4e0e769b05891938528dc3dd784fab8f036794b05e1793798754edc174240c48d437a5e1e3fbb5f533b217799c
-
C:\Users\Admin\AppData\Local\Temp\1000005001\55555.exeFilesize
14KB
MD5f67209be280a39b7fc1f172df9f02fe6
SHA1e1ad6db0485504c708b27f95951509ac56183568
SHA256f7820db830883b488cd5306d75126ce2be2b241c44217197fce67ea7283a7086
SHA5121a0c651e9aa8f984b1301b00f06567564e31e488e4c25035fca0e788d11c29eb2eb3626c55ac3e0e8fba1061225e5d5e43f123ee08d43bb4d9873d674be4aaa4
-
C:\Users\Admin\AppData\Local\Temp\1000005001\55555.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\1000005001\55555.exeFilesize
64KB
MD506900b1c94b4858708cba1fab235ec46
SHA173b00bee2580eecf3b596132b2871d02c0e692fa
SHA25618208fb4ff7717a3ff1cb5e806a4c6b42ef886d5e519c4887a84994bfb107acc
SHA51296940d1201d3ae6cd506bad6d3161acb14eae3f8060a1b7cb8df12a7004eaf7201eaa7952c8a602a7666c741aa000e981c7287d0c416285ed6f2fbb0203ee0f2
-
C:\Users\Admin\AppData\Local\Temp\1000006001\1233213123213.exeFilesize
319KB
MD54f8c9a271b349665ee30c0b4fd69ffe0
SHA160dd03b1dce49f1f24178698c5f232cdff829e66
SHA256ef7f1186d53ced725d3d649e6b7a32781ecc1915bf7ad05d6769fbe651f2ad30
SHA51208d9822035ac035bb23bcf48b4809a87cafa4730a192de58dfd44b22cecea18f27a5440162f09caaa48e5460d353b98c27f7e505887a4a5babb751ccabbf6e24
-
C:\Users\Admin\AppData\Local\Temp\1000006001\1233213123213.exeFilesize
149KB
MD52e5ce40f3e26593ab1e6e1a005416f1c
SHA157253a5739c84536dea83278cd29b14707c08924
SHA256869ed7f3fd126d71b030a8ccfeb8fb5603f04e9ae726baec0f704dd516dd4a8c
SHA5124a6356aa8ce743c3080af9b3314ad943659dfe4bee35167d642f869a7eba8262a4fee60b04128dd511c3b81578b72905c4b7fb0012c81072eddcc8554d850403
-
C:\Users\Admin\AppData\Local\Temp\1000006001\1233213123213.exeFilesize
170KB
MD5386ee5ed52a571413165464f9ff3ef97
SHA1b460121882d7efaff5eea6089f054a36b02b5759
SHA256815351621d2077b9a360396c552c933469b19dd603dcb0af4b9dc775c124f052
SHA51290388336fd1c67da17c7576db7adc5df419119343acd1e3a61da0ac8606041c26a5d4976772fb235fed408db6cfcbd08b6fbee3bc91f6ac59dde30e564d33d13
-
C:\Users\Admin\AppData\Local\Temp\1000007001\sadsadsadsa.exeFilesize
105KB
MD5cab9188c1739839d5c80cda1ba72c964
SHA10c1f237ba69f2e511bb43b7109235feb0d6e0b94
SHA25694fff9d8686beeaef0e8e6080b96da53c5dba740906d278530ab3b2cd8e8f2fa
SHA512055dcc265a2fa360f1ae43b5cd9968fc6fa05a18287fa77dd7cd92475ca05a59bd38a1b76371b66ec531c9327e7861cc52abd823505a66c0df58a9e18a6ca22a
-
C:\Users\Admin\AppData\Local\Temp\1000008001\goldklassd.exeFilesize
399KB
MD5a647afc0219638fb62a777cd2f32a4bd
SHA1ef5ad8aaac4adcf8856a939e8d17259cccb22035
SHA256b5e5a6adbbb37ddc7b3aa54df9bfb61c2038d887db8f44d1deb63e64fddf4436
SHA512411a4a24aa37242276798cda5cce488165b828d9929c71891d5af926229068161796684e9f6476f8ca460d79facbc45fa8125c030c3645a3dcab7dca2ebfa044
-
C:\Users\Admin\AppData\Local\Temp\1000009001\lumma1234.exeFilesize
259KB
MD57da9242dd3feb33eb4a577bdf59ed5bc
SHA1a14dcd288d7b540dd1f6aa17635195b0af411507
SHA2564411e6ccad2c06ee073c569155bc21afabda70d48b33d7424c276b9824c5dfae
SHA512f7d7c20da5d2c404e9f384e830d8c6dc52e1b65f7afd1c1266bcb9a434893c871373ed233217d5555939c04d1b568b60f90a0ccfe8f14e998cce5e5835d5930e
-
C:\Users\Admin\AppData\Local\Temp\1000010001\dayroc.exeFilesize
287KB
MD5ec30ce5d1589284a4291613d4db52833
SHA1311748226e9b013d5dc52f55337ee215d068f1f0
SHA25698101904f4b991bc2822de09ef0a0fabe0c64d4301402b4135fcdc923d4d764c
SHA512855670b876dda97512141f18b666c4f038739ddd649900214b42ff27b9ab6ef884b254d30622756d5f6ee4fdd6234451a5bfe90eb4d09678c925c7c932f808c7
-
C:\Users\Admin\AppData\Local\Temp\1000011001\daissss.exeFilesize
421KB
MD510a331a12ca40f3293dfadfcecb8d071
SHA1ada41586d1366cf76c9a652a219a0e0562cc41af
SHA256b58eec6e5aabc701404d5b5556c86fff5cc103c69eeda00061e838c4f122288f
SHA5121a5b8e77ddbab97bb4c848adbcd7dbfb9ca84307d1844dba9572fcea48a2cbb091a3fc52663b87568416adf18a1338adc07aab0bd5f1ab36a03c8ff8a035d399
-
C:\Users\Admin\AppData\Local\Temp\1000019001\leg221.exeFilesize
292KB
MD5d177caf6762f5eb7e63e33d19c854089
SHA1f25cf817e3272302c2b319cedf075cb69e8c1670
SHA2564296e28124f0def71c811d4b21284c5d4e1a068484db03aeae56f536c89976c0
SHA5129d0e67e35dac6ad8222e7c391f75dee4e28f69c29714905b36a63cf5c067d31840aaf30e79cfc7b56187dc9817a870652113655bec465c1995d2a49aa276de25
-
C:\Users\Admin\AppData\Local\Temp\1000022001\pixxxxx.exeFilesize
1.2MB
MD5e2695d45520fe4058a6df4dff94b51e9
SHA1d78899abd8d0cca04c062a9bc5a5a3758c77683d
SHA2569f51a2ea69977f334c9bc84a4b16a144b8480f978eb975a0e8027a4614c36e8f
SHA512a7f30148367905b1ed413fda9f7c008e651f723a39b582ea095c14728cdc971c43918136c760cbac8d5731db471067a7acb3f311111022f529b9b62c978cdfb7
-
C:\Users\Admin\AppData\Local\Temp\1000025001\mrk1234.exeFilesize
698KB
MD5bf2a3e48b0ea897e1cb01f8e2d37a995
SHA14e7cd01f8126099d550e126ff1c44b9f60f79b70
SHA256207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
SHA51278769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
C:\Users\Admin\AppData\Local\Temp\1000026001\plaza.exeFilesize
1.1MB
MD580d921818dbe8fe90b76dc3e5095a9e1
SHA1fbaf52df87a45d19ddbf6a75b5697e14290e21b9
SHA2569a73873348e5a99e1594383eb7b5753c15cdc9db421614681a914937f9d1db0f
SHA512a22093f19ad9575a8b2a9169886973204985cc06bb8ddcc66cd2fcee5543077958e7b90255ebdbea7166cdf55ef1c6bc864b9e48e07c0d1d6a4076e62e064d26
-
C:\Users\Admin\AppData\Local\Temp\1000027001\ladas.exeFilesize
704KB
MD56c17c28866f968bfffe603c3a4f5a685
SHA181e34391718ca539981b3e94d123ffbb5027453b
SHA256ef3feda33b00393f0a25469b8d8e2832c46c86b1d212bc23a88871489a26ddf8
SHA5128f202c9efb0175a5b0bd648c6f6e0aaedf356cceaad53f31959063dde6f6ccabf777e76c034470b1baa7819c166372171725b373adb95014c8fab69d44dbfa26
-
C:\Users\Admin\AppData\Local\Temp\1000028001\sehv.exeFilesize
754KB
MD577d117991eb0289267f32080fd1a26a2
SHA1ccb05a4825ecfec0ebfc89058e4b671ac1772fd8
SHA256d997205df962c1a04bf549616eaa0fb839c4bc549056eb2b37fe3d6c51ad9b32
SHA5122621ac8a38e20405e14a376026e6f05a2b22958e33ce3117d8270c0abcfbaa6dc1d6dba359f00a7efce21d50177940f58592272068a27c970f09658de36b5f70
-
C:\Users\Admin\AppData\Local\Temp\1000029001\redline1234.exeFilesize
2.5MB
MD55dec9f02f7067194f9928e37ed05c8f6
SHA106f13ca068514d08f0595ded4ef140078888235a
SHA256dfecb99cc255e99b5df34a042f0585c0e8458a4e0075e7d513d2c0b492c41806
SHA51298f980ab103c54c4b1b344b738bcaccd10a35923749a730dd3386355897156d382f01715d07a056ff7451e876898a76268328f92d1e8203b254bb7a082f18e7c
-
C:\Users\Admin\AppData\Local\Temp\75E9.exeFilesize
5.0MB
MD51061025db882cfebc61d6ff691f6ab65
SHA1747a58d19b2bdf0f727590321991330e7716c490
SHA2566d27e7c970d9cccae2b4dd67c55484c5f9049caa37f3d6f94e12d2ea5dd900b8
SHA512ecf0af254a52c89505532120a2531ec8c799d07ccd1e457ac673d6c728d3cb6b180313aa24a3101f2ee78901628378fc7f4d6cdee2d1e49593bc55cc2194e487
-
C:\Users\Admin\AppData\Local\Temp\75E9.exeFilesize
6.0MB
MD595e59305ad61119cf15ee95562bd05ba
SHA10f0059cda9609c46105cf022f609c407f3718e04
SHA256dd87f94c961b9612bbd65761bee6ed15318d63652f262e2c425bd177a2341a19
SHA5125fbcfe79162460080e0c3944df747835f0b8f2cdb35b038eb69eadf2eb85a209f7d5432a328d0f0eeafba036012f48793e3c08d94531b98a12a498bcf3b00ad2
-
C:\Users\Admin\AppData\Local\Temp\87EB.exeFilesize
295KB
MD5b9d96d8d389f49372d8a2fcc566fb29a
SHA1cdc59b70f9354ebcd52e36eb3399fd0a12d91e10
SHA2568866640a1e487668dbf7ec4abebb601cf38ec74219158a2ec90a7d6195b995af
SHA5125adc99e6a614403c6133ed518a243b3a65b9f75186230648aa9cb8e4cc94df06177d8cbb0596461d2071257e06dcb0af133d4a1903f65fd5e36f3fa8236dbd46
-
C:\Users\Admin\AppData\Local\Temp\87EB.exeFilesize
155KB
MD533153a8591cbf21362a9b8973cb1f629
SHA11953f74e90289bc8a4b3880dce0a0b0dbf378fb4
SHA2567cf87797a5a27e24a524399e0d49e51c48e0e20bf00175d5b0d70c6127f18128
SHA5120d51d39cfcb8fe0f7822636d301afbbf641a42d2a2111610994e76f770d4f092235ca6f832eca1d5806a6f1d27c175a9dca40fcc6d192cf2d8326ba1fcc28f00
-
C:\Users\Admin\AppData\Local\Temp\8F6E.exeFilesize
541KB
MD5e24883bbb7ebcf1423c84d8be62dc185
SHA13122882b822e5b56b1b1aad34356279d7d011353
SHA256e30d0685ba2390d166abfa3b55a4d663373d7cc759f9d4cb25a91cb1a2f1e9f0
SHA512318386e706ea257ceb94ea602914a14d6b1e96e8d9431b7689007afec1c50f5eac10ff6de7ec2da04990beeda61355b2f0eb57941e8523b37f3957b57fe91d20
-
C:\Users\Admin\AppData\Local\Temp\8F6E.exeFilesize
93KB
MD52ac51139cc7a7c37b3695e563e7444ab
SHA18d15dae12d542e539a65f616b2e0ba31e1c231c5
SHA2569bb8a32bb7969998e719a8030ac23c61da6a1a516213894be9cb4d8c0464bd69
SHA5122a86b1d03c290cd54971cbd02c6f079bdce8efe4bd4d84801802f208bb6450c91e5b7371c1137d7d0964aa4f7270b7d9db6a1aafe2056d08620d74d4c75ff2dd
-
C:\Users\Admin\AppData\Local\Temp\924.exeFilesize
772KB
MD5bab1ea0e1eba81e7bf661766ac1ac177
SHA112e1aa39059fd8a727214592f415bee1c9905177
SHA256ee5bcfc6e9d4decbf39ff9712d339dbff29fb1f6c780c6f61a41166abeee0d1c
SHA512066a0b3a2daad8a888a5b2d968ed5ab897b742d28da98b28e39d6d538a729ab5331f566e3f57d1c89978c597e97dd64fe9fd050986741be2bb1ca9b42458b234
-
C:\Users\Admin\AppData\Local\Temp\97DB.exeFilesize
141KB
MD51233c0d1f82917366cc8755643e095e8
SHA1615b9a82c32355b42d0486caadbefeaed4f1e752
SHA2560ce99918f65934916a0c65201b44669fdcbc22c4ee20b73a5564d9643b6b676d
SHA5120ade063ab7f1fc9270ecf2d68187e8351d3e7292742a8219b632a49158f17f0a0024699d3e7e641dafe3eb11e34e5007945bbf7bb161724c603b24312e4a2bbb
-
C:\Users\Admin\AppData\Local\Temp\97DB.exeFilesize
73KB
MD57b66380b9773b164ec451fc4dce730a6
SHA172ab0007b0dcdd409a1124ab4bac0d7bdb1afa39
SHA2561d76b01e9399d12bbb135b9fc1040ae9eeba22e7811dd86d7fd935a984b74967
SHA512aa5f12f8ec0ea36b09b9330d2116718481029414e1331768bec70b2e49435a5e99a900279555f3acd8efab02f3623e582e68f4f9107204115c4afb19e2c01d05
-
C:\Users\Admin\AppData\Local\Temp\EA02.exeFilesize
238KB
MD58c20d9745afb54a1b59131314c15d61c
SHA11975f997e2db1e487c1caf570263a6a3ba135958
SHA256a613b6598e0d4c2e52e6ff91538aca8d92c66ef7c13a9baadcba0039570a69d1
SHA512580021850dfc90647854dd9f8124418abffbe261e3d7f2e1d355dd3a40f31be24f1b9df77ad52f7fa63503a5ee857e270c156e5575e3a32387335018296128d7
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i100lkj3.q0k.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\nsp5ABA.tmp\INetC.dllFilesize
8KB
MD58b7c6f19b267c3c6cbab50b8b90c8ac4
SHA14c0df006a786bdc88035738ead30eb1285a92c86
SHA256f9dc08a08510cab75fbfe16473c1388ae4fd4688d21bb2ace723fb8c72b5b635
SHA5125508113bb74403ee1d6440c2d12e03b73cb51f67e9f18df343ec917dd5b22c8fdeae0c29100049158acbedf645743802c0ae7803608a63507eb5fb2dc12f74cf
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build2.exeFilesize
385KB
MD563e4a9cd7a8b37335b5f18cefc5dd9d2
SHA1c781a30935afc452b108cc78724b60f389b78874
SHA256c1e75efde3fd1da605135e5c3ffab0073299c80632d136f8eeba9d4a7c98c70f
SHA5123818b5966938704c5830acb5426db7791f6ae476853248d8984b1aff35a6722a0684bea54a53ef6ded1f301f6de9ed044d45f007457a9c0f3a7ea3afc7bf0ecc
-
C:\Users\Admin\AppData\Local\bd75dcd6-1571-4c19-bada-6591cd3f30eb\build3.exeFilesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
55KB
MD5ba1147d0e922b60892aebd6e1d5a0e5f
SHA10e24451c4afce74d3bac10b06ff75a579ee6169f
SHA2560e1a186d52da517e6d4ca8137fb91850aa8763ec38ca8c868f68126fc3546447
SHA51261fb75949c7fa0db8a17a568ca903bb5bccd6bcdcf2da919efa0c36bf99870c50551fe30ae277305acdd6f8aeca6fd9a48b8d3044f998483eaa404da356120e2
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
40KB
MD5aebd4797b6528339ac4614876c9dbc71
SHA13b4fee837e08964809be33baace64d670c4f67d5
SHA2568927f816c232320684111faad2f49d9304bce09bef23d7b4a0249dba2f0fd485
SHA512a9b63951507efc5c44bdef71000e29a8de0d4988f7bcb7fd60ae167d1d3d50047242d5f4098635cbc354bf5e97dcdc325dc5300f387e102615dac8ddf8b5c110
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
90KB
MD58c0fb3212b968e81b1960ab34d2d0f55
SHA1da9fc9af7f912d52df7ef82c3a005257b5f175b5
SHA2562184148fe1ed77fabc86132866ad03d111ba3842673dab8ed1791d7f9588a1de
SHA5127e3bc5c51da06ea0f70f4ef6b690897c6fbf92f1fb5344a2c23eb62e5b83ce092223db0e54b9ce06304c506bb63b878a8d25b54fa1a9964341e3faaa9e4618ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
189KB
MD521cf40e582099b58443d2ff1027d6e1e
SHA18b0383d5363d23e72edf0d2c231a1125283c3913
SHA25614f1443c9bab7dc77f20108bb0c8521b1a669a81620e6fd045bec1565fab21ff
SHA512b156956bdf4026bcd65ccd2f7edc373d37ca90d62946b1143bc602cbcf66bab6d04c9336ef0cf331d4e77957b2b6d1d1f4709fdf6aa04ce23bc9dc3d4a970ec8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
181KB
MD5a3d635e132d0a438b4dc3d12a34c0233
SHA15580533fd1fb4253da2dcd72ea91f007c25a3d10
SHA2565d25995914d54b47d1f36a3ba65b9fb83469a71e301218f30c08c4195c8a5d39
SHA512d0fab75bef8ca63871b08def1621ca60d24cde080f3c4446a2733395ff7d8faa3d4ab5d88137b7bcddf84cd7228417e620578bf6c896d8d0d96d87b222241516
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exeFilesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exeFilesize
256KB
MD5a1f9f9a4f753af5fb8b13fcf25a1b44c
SHA144977a8a9410a963e9985840b7d902ff19f1ee8d
SHA25674160dda6eb8937c41feb9a324a7bea1da2325302d27e3bcc0d8c9722ec2860d
SHA512416d2d9fd26c66a5902a9ca7848b21cec47936e9c7d067a902b3ac6573366dd08e9787de139606746b9951c6ee5364363d66fcea8d905b8124cb1a39f6f87612
-
C:\Users\Admin\AppData\Roaming\configurationValue\Logs.exeFilesize
319KB
MD54b53efae93cc868a20681bfe9c499712
SHA1a8dac43231f4a8d6f42d5b5f7086a38bcad0c851
SHA256db91745fbb4b39c7eed886015bfe42b82799fac5ab4bd9ad0b0039c16c56e6ca
SHA512fc7a81fc03df20ce343267b67a992ac685fc9b0572efa77fb834ad41114879a6449d4d7dd27d338fa3bc1bcf5c84e4e2294a376204bc007df4c3c3113e33a8dc
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exeFilesize
414KB
MD53cc8f1d48b809ff3a70577204b9028c7
SHA151f52e0712029f7df64ec9cb704d6a1a01029dad
SHA2567d1fbbd7ff4f10c7612d587730a3fee0bf2213d1f214484cf20231ef21cf7532
SHA512230791bf7b4a8f7240b76e5aa3aad341d034086e3b0f62e02d187605b0cbccb8fdeb2c431bb94dd019f29021c7b6de4c5409f626adc0ec86dc7259fcfff3fd4b
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exeFilesize
243KB
MD5323d35c2b30136eb7ed17fbb683598cf
SHA1a092be72e18ca8f82c66cbba737234743401d009
SHA256bb7bb514eb54786228c4856dd4144303883b31e0ff8913c85d66cf6f46c5f275
SHA512cddd77acd980da7bfd966f62177c65edf28f9fe1459bc9a39205a42c1e74da150de391ad0271103e8c5112ca02bcf7cf85128d15e717be9bffc68816e5dc0a4c
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exeFilesize
313KB
MD5753db7d6804f9f27aaf30fe62c00a011
SHA14c29fef91e4a099c08b90c0aa9f0397fba36d452
SHA2568f09598518b4d2a084e1fe1068c43027fe9e6caed74de0926bdac110a305ac2c
SHA5127ff04ef374e8a97b58f110dbf3451493c2e2644fce3935a6d4107074819d9547ea861c06a2ed24b5d459f41784bcc0be107c920e78310332ca50f3143b7ac830
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exeFilesize
183KB
MD50a04611c83a1a8c7bf9e26429c0b9d6a
SHA10c8ea60c0f145cfbd20b2234b01895a9da80cc74
SHA256f93fa9fae773fcbe4022261a4e89c1f2d89663f0738c4c28a08441cda8567d5e
SHA512038ea3f0dc62a2889459e3aa958b9042b03b1f3a46b621de56cabf6a15b4d69ecda17821c09b3b62cf0e308ace4e1cab9ee9e061d931459e6c85e07a984b2412
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exeFilesize
1KB
MD54a753e2dfc1b5fe1c65cd7efc0a2be85
SHA19ebea4e0a486018e3f3b23aabe8f9ad9083f730a
SHA2560b75ce0d0bfc58269d7ef7b1839c9f478c550836867be83f8a5d4da54927736a
SHA51253985ecf9038beaa276f51149c77dfdfda42db516674dc7b28f18976d04a0c7f1bd3caa2bbb7a7c21f66b4099ce3f8867daf7466ff2f21bb0a116b293e93f4f1
-
C:\Users\Admin\AppData\Roaming\configurationValue\olehps.exeFilesize
313KB
MD55ea776e43112b097b024104d6319b6dc
SHA1abd48a2ec2163a85fc71be96914b73f3abef994c
SHA256cf650d13eea100a691f7f8f64674189a9c13d7948e31468963e10a23726dc341
SHA51283667045b7da8596fad90320880d8d7c83f71a1f043d73f7b68a0ad948ae2e530a753d5c7943a096a307e696f8d9fa433025b30078af6d4530d1a2f2a4b12ed2
-
\Users\Admin\AppData\Local\Temp\Protect544cd51a.dllFilesize
128KB
MD5ca4eda9011f6a2149fa8236f4d19b52c
SHA18a5658f2b0ed45e0072a5f13614535b31e264905
SHA25694ec9ad8dd8d8f9cf94a55071c0f1cc74905adfc898e5db6e0bd43729c888368
SHA512d3029e572d8a5d1ed3accc83d984085d1c68c001bcb00297975907751b9fe171ff5177e5ecc285a54544cd4ddf786c0277060550494a60a33f9e45c0468f1051
-
\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
137KB
MD593db43503e22f24dcaba3ee455c9be86
SHA1048a0b808e139feb17ea93b8be4f534715547db4
SHA25609b3a9944ee5baedd57e50ac244c0d772b826230e619eb88df2f4b96a40eefbd
SHA512c6ed73fbf42ea06dbec5e7e2d5e43a3eedc8c9a0e926cddc6cf4320ded6e24cb082d22b018ba0f929d8a9c6ee1a300f939e3fff37d862c41e84d8d9c6bf78be5
-
\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
91KB
MD5d6fb4e0b392f1f3d6ebe9d21dc04f47a
SHA1a385930d979caafd9411283b562539ada2e2ab93
SHA25629d567a40937697366b42de1e30a49c1a256e7c4522d7d9e34657779e06d4e9d
SHA5128625ce31f04169abb7c4f47c2566126bcbcbb3ed78fa787512dd3debe8229766b19831296c61c8443f05e40b37dd4614ab6a1dc8c26b903fcebc5958d8fdfbcb
-
memory/428-66-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-65-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-63-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-59-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-58-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-53-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-82-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-91-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-52-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/428-51-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/436-75-0x0000000000570000-0x0000000000670000-memory.dmpFilesize
1024KB
-
memory/436-76-0x0000000000470000-0x00000000004A0000-memory.dmpFilesize
192KB
-
memory/520-249-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/520-1-0x0000000000720000-0x0000000000820000-memory.dmpFilesize
1024KB
-
memory/520-245-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/520-3-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/520-2-0x0000000000580000-0x000000000058B000-memory.dmpFilesize
44KB
-
memory/520-5-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/676-141-0x0000000005A50000-0x0000000005F7C000-memory.dmpFilesize
5.2MB
-
memory/676-185-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/676-138-0x0000000005320000-0x00000000053BC000-memory.dmpFilesize
624KB
-
memory/676-139-0x0000000005420000-0x0000000005430000-memory.dmpFilesize
64KB
-
memory/676-137-0x00000000003E0000-0x0000000000938000-memory.dmpFilesize
5.3MB
-
memory/676-136-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/676-140-0x0000000005290000-0x00000000052AA000-memory.dmpFilesize
104KB
-
memory/1040-190-0x0000000003470000-0x0000000003482000-memory.dmpFilesize
72KB
-
memory/1040-200-0x0000000007AE0000-0x0000000007CA2000-memory.dmpFilesize
1.8MB
-
memory/1040-195-0x0000000005BC0000-0x0000000005C0B000-memory.dmpFilesize
300KB
-
memory/1040-196-0x0000000005D30000-0x0000000005D96000-memory.dmpFilesize
408KB
-
memory/1040-197-0x0000000006780000-0x00000000067F6000-memory.dmpFilesize
472KB
-
memory/1040-198-0x0000000006A60000-0x0000000006A7E000-memory.dmpFilesize
120KB
-
memory/1040-199-0x0000000007540000-0x0000000007590000-memory.dmpFilesize
320KB
-
memory/1040-181-0x0000000000FF0000-0x0000000001084000-memory.dmpFilesize
592KB
-
memory/1040-192-0x00000000034D0000-0x000000000350E000-memory.dmpFilesize
248KB
-
memory/1040-191-0x0000000005AB0000-0x0000000005BBA000-memory.dmpFilesize
1.0MB
-
memory/1040-182-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/1040-210-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/1040-187-0x0000000005FB0000-0x00000000065B6000-memory.dmpFilesize
6.0MB
-
memory/1040-188-0x0000000003340000-0x0000000003350000-memory.dmpFilesize
64KB
-
memory/1236-220-0x00000000000C0000-0x0000000000AC5000-memory.dmpFilesize
10.0MB
-
memory/1328-122-0x0000000000820000-0x000000000137B000-memory.dmpFilesize
11.4MB
-
memory/1328-118-0x0000000000820000-0x000000000137B000-memory.dmpFilesize
11.4MB
-
memory/1328-129-0x0000000001A40000-0x0000000001A41000-memory.dmpFilesize
4KB
-
memory/1328-128-0x0000000000820000-0x000000000137B000-memory.dmpFilesize
11.4MB
-
memory/1328-127-0x0000000000820000-0x000000000137B000-memory.dmpFilesize
11.4MB
-
memory/1328-130-0x0000000000820000-0x000000000137B000-memory.dmpFilesize
11.4MB
-
memory/1328-115-0x00000000018B0000-0x00000000018B1000-memory.dmpFilesize
4KB
-
memory/1328-116-0x00000000018C0000-0x00000000018C1000-memory.dmpFilesize
4KB
-
memory/1328-121-0x0000000001A30000-0x0000000001A31000-memory.dmpFilesize
4KB
-
memory/1328-119-0x0000000001A10000-0x0000000001A11000-memory.dmpFilesize
4KB
-
memory/1328-120-0x0000000001A20000-0x0000000001A21000-memory.dmpFilesize
4KB
-
memory/1328-117-0x0000000001A00000-0x0000000001A01000-memory.dmpFilesize
4KB
-
memory/1408-27-0x0000000002040000-0x00000000020DC000-memory.dmpFilesize
624KB
-
memory/1408-28-0x0000000002210000-0x000000000232B000-memory.dmpFilesize
1.1MB
-
memory/1880-183-0x0000000000E20000-0x0000000000E74000-memory.dmpFilesize
336KB
-
memory/1880-194-0x0000000005780000-0x000000000578A000-memory.dmpFilesize
40KB
-
memory/1880-189-0x00000000056E0000-0x0000000005772000-memory.dmpFilesize
584KB
-
memory/1880-186-0x0000000005BE0000-0x00000000060DE000-memory.dmpFilesize
5.0MB
-
memory/1880-213-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/1880-193-0x0000000005800000-0x0000000005810000-memory.dmpFilesize
64KB
-
memory/1880-184-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/2432-100-0x0000000000860000-0x0000000000864000-memory.dmpFilesize
16KB
-
memory/2432-98-0x00000000008E0000-0x00000000009E0000-memory.dmpFilesize
1024KB
-
memory/2896-49-0x0000000002160000-0x00000000021FD000-memory.dmpFilesize
628KB
-
memory/3108-214-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/3108-160-0x0000000000400000-0x0000000000592000-memory.dmpFilesize
1.6MB
-
memory/3108-171-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/3324-4-0x00000000009A0000-0x00000000009B6000-memory.dmpFilesize
88KB
-
memory/3324-18-0x0000000002580000-0x0000000002596000-memory.dmpFilesize
88KB
-
memory/3592-45-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3592-33-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3592-32-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3592-31-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3592-29-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3856-81-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3856-108-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3856-77-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3856-80-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/3932-105-0x0000000000410000-0x00000000004D5000-memory.dmpFilesize
788KB
-
memory/3932-104-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3932-97-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/3932-102-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/4216-165-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/4216-146-0x0000000000CA0000-0x0000000000E38000-memory.dmpFilesize
1.6MB
-
memory/4216-147-0x0000000071710000-0x0000000071DFE000-memory.dmpFilesize
6.9MB
-
memory/4216-217-0x0000000003110000-0x0000000005110000-memory.dmpFilesize
32.0MB
-
memory/4216-148-0x00000000056B0000-0x00000000056C0000-memory.dmpFilesize
64KB
-
memory/4216-166-0x0000000003110000-0x0000000005110000-memory.dmpFilesize
32.0MB
-
memory/4868-156-0x00000000776A2000-0x00000000776A3000-memory.dmpFilesize
4KB
-
memory/4868-154-0x0000000000E50000-0x0000000001855000-memory.dmpFilesize
10.0MB
-
memory/4868-155-0x000000007E380000-0x000000007E751000-memory.dmpFilesize
3.8MB
-
memory/4868-170-0x0000000000E50000-0x0000000001855000-memory.dmpFilesize
10.0MB
-
memory/4868-172-0x000000007E380000-0x000000007E751000-memory.dmpFilesize
3.8MB
-
memory/4892-19-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/4892-17-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/4892-16-0x0000000000560000-0x0000000000660000-memory.dmpFilesize
1024KB
-
memory/5064-211-0x00007FF95C120000-0x00007FF95CB0C000-memory.dmpFilesize
9.9MB
-
memory/5064-208-0x0000000000C80000-0x0000000000C88000-memory.dmpFilesize
32KB