Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10_x64 -
resource
win10 -
submitted
08-10-2020 15:06
Static task
static1
Behavioral task
behavioral1
Sample
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe
Resource
win10
General
-
Target
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe
-
Size
575KB
-
MD5
25584c202327f5c5bba3e2cf6fce6e80
-
SHA1
cc8fa8e61ce0253fe9ac9efb19718d54774d8ab8
-
SHA256
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770
-
SHA512
f5c1a1a85d84d4c2824717af21e9bf34c1dac7612bba3be73df065eb17793fb670c2718349e325984e5b0946524821fa1cbf5f1b3eb740bcb22952e408b1fab5
Malware Config
Signatures
-
Matrix Ransomware 64 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exedescription ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\el\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\pt-PT\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{31ed5eb8-b73f-405a-9d70-35368cd2ee5f}\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\tr-tr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hr-hr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0lj62mcv.default-release\datareporting\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\he-il\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Microsoft Office 15\ClientX64\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\eu\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-il\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\tr-tr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.PPIProjection_cw5n1h2txyewy\Settings\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{f48ea7ba-f040-4276-8f41-d12a11f96b11}\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-si\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\eu-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\lb-LU\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-si\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ro-ro\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-tw\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-ae\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\he\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\hr-hr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\AC\INetCache\TCZH0X01\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\nl-nl\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Packages\DesktopView_cw5n1h2txyewy\Settings\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-il\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\root\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ko-kr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\eu-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ja-jp\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\es-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\qml\QtQuick\Controls\Styles\Flat\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 4992 bcdedit.exe 4932 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
2wiCh7aU64.exedescription ioc Process File created C:\Windows\system32\Drivers\PROCEXP152.SYS 2wiCh7aU64.exe -
Executes dropped EXE 64 IoCs
Processes:
NWFKHNfX.exe2wiCh7aU.exe2wiCh7aU64.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exe2wiCh7aU.exepid Process 1324 NWFKHNfX.exe 4572 2wiCh7aU.exe 4604 2wiCh7aU64.exe 4892 2wiCh7aU.exe 4928 2wiCh7aU.exe 5084 2wiCh7aU.exe 5108 2wiCh7aU.exe 4208 2wiCh7aU.exe 4288 2wiCh7aU.exe 4508 2wiCh7aU.exe 4676 2wiCh7aU.exe 4216 2wiCh7aU.exe 4880 2wiCh7aU.exe 3884 2wiCh7aU.exe 4180 2wiCh7aU.exe 4536 2wiCh7aU.exe 4652 2wiCh7aU.exe 2572 2wiCh7aU.exe 4516 2wiCh7aU.exe 5012 2wiCh7aU.exe 264 2wiCh7aU.exe 4360 2wiCh7aU.exe 5092 2wiCh7aU.exe 4324 2wiCh7aU.exe 4316 2wiCh7aU.exe 256 2wiCh7aU.exe 4700 2wiCh7aU.exe 5112 2wiCh7aU.exe 3948 2wiCh7aU.exe 4984 2wiCh7aU.exe 3844 2wiCh7aU.exe 2548 2wiCh7aU.exe 5076 2wiCh7aU.exe 3888 2wiCh7aU.exe 2528 2wiCh7aU.exe 5080 2wiCh7aU.exe 4480 2wiCh7aU.exe 4484 2wiCh7aU.exe 4684 2wiCh7aU.exe 4932 2wiCh7aU.exe 4720 2wiCh7aU.exe 276 2wiCh7aU.exe 3696 2wiCh7aU.exe 4708 2wiCh7aU.exe 3960 2wiCh7aU.exe 5096 2wiCh7aU.exe 4944 2wiCh7aU.exe 3780 2wiCh7aU.exe 4688 2wiCh7aU.exe 4396 2wiCh7aU.exe 4956 2wiCh7aU.exe 5104 2wiCh7aU.exe 4964 2wiCh7aU.exe 4444 2wiCh7aU.exe 4416 2wiCh7aU.exe 4812 2wiCh7aU.exe 4412 2wiCh7aU.exe 4940 2wiCh7aU.exe 4908 2wiCh7aU.exe 4900 2wiCh7aU.exe 4424 2wiCh7aU.exe 4696 2wiCh7aU.exe 5128 2wiCh7aU.exe 5256 2wiCh7aU.exe -
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule behavioral2/files/0x000100000001ad9d-2.dat upx behavioral2/files/0x000100000001ad9d-3.dat upx behavioral2/files/0x000100000001ada3-17.dat upx behavioral2/files/0x000100000001ada3-18.dat upx behavioral2/files/0x000100000001ada3-31.dat upx behavioral2/files/0x000100000001ada3-33.dat upx behavioral2/files/0x000100000001ada3-39.dat upx behavioral2/files/0x000100000001ada3-41.dat upx behavioral2/files/0x000100000001ada3-47.dat upx behavioral2/files/0x000100000001ada3-49.dat upx behavioral2/files/0x000100000001ada3-55.dat upx behavioral2/files/0x000100000001ada3-57.dat upx behavioral2/files/0x000100000001ada3-63.dat upx behavioral2/files/0x000100000001ada3-65.dat upx behavioral2/files/0x000100000001ada3-74.dat upx behavioral2/files/0x000100000001ada3-76.dat upx behavioral2/files/0x000100000001ada3-82.dat upx behavioral2/files/0x000100000001ada3-84.dat upx behavioral2/files/0x000100000001ada3-90.dat upx behavioral2/files/0x000100000001ada3-92.dat upx behavioral2/files/0x000100000001ada3-98.dat upx behavioral2/files/0x000100000001ada3-100.dat upx behavioral2/files/0x000100000001ada3-106.dat upx behavioral2/files/0x000100000001ada3-108.dat upx behavioral2/files/0x000100000001ada3-114.dat upx behavioral2/files/0x000100000001ada3-116.dat upx behavioral2/files/0x000100000001ada3-122.dat upx behavioral2/files/0x000100000001ada3-124.dat upx behavioral2/files/0x000100000001ada3-130.dat upx behavioral2/files/0x000100000001ada3-134.dat upx behavioral2/files/0x000100000001ada3-141.dat upx behavioral2/files/0x000100000001ada3-143.dat upx behavioral2/files/0x000100000001ada3-149.dat upx behavioral2/files/0x000100000001ada3-151.dat upx behavioral2/files/0x000100000001ada3-157.dat upx behavioral2/files/0x000100000001ada3-159.dat upx behavioral2/files/0x000100000001ada3-165.dat upx behavioral2/files/0x000100000001ada3-167.dat upx behavioral2/files/0x000100000001ada3-173.dat upx behavioral2/files/0x000100000001ada3-175.dat upx behavioral2/files/0x000100000001ada3-181.dat upx behavioral2/files/0x000100000001ada3-183.dat upx behavioral2/files/0x000100000001ada3-189.dat upx behavioral2/files/0x000100000001ada3-191.dat upx behavioral2/files/0x000100000001ada3-197.dat upx behavioral2/files/0x000100000001ada3-199.dat upx behavioral2/files/0x000100000001ada3-205.dat upx behavioral2/files/0x000100000001ada3-207.dat upx behavioral2/files/0x000100000001ada3-213.dat upx behavioral2/files/0x000100000001ada3-215.dat upx behavioral2/files/0x000100000001ada3-221.dat upx behavioral2/files/0x000100000001ada3-223.dat upx behavioral2/files/0x000100000001ada3-229.dat upx behavioral2/files/0x000100000001ada3-231.dat upx behavioral2/files/0x000100000001ada3-237.dat upx behavioral2/files/0x000100000001ada3-239.dat upx behavioral2/files/0x000100000001ada3-245.dat upx behavioral2/files/0x000100000001ada3-247.dat upx behavioral2/files/0x000100000001ada3-253.dat upx behavioral2/files/0x000100000001ada3-255.dat upx behavioral2/files/0x000100000001ada3-261.dat upx behavioral2/files/0x000100000001ada3-263.dat upx behavioral2/files/0x000100000001ada3-269.dat upx behavioral2/files/0x000100000001ada3-271.dat upx -
Modifies file permissions 1 TTPs 64 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exepid Process 4624 takeown.exe 5488 takeown.exe 5288 takeown.exe 5972 takeown.exe 5804 takeown.exe 4992 takeown.exe 1956 takeown.exe 2568 takeown.exe 5932 takeown.exe 5372 takeown.exe 2440 takeown.exe 5440 takeown.exe 5524 takeown.exe 5620 takeown.exe 4212 takeown.exe 4436 takeown.exe 4420 takeown.exe 5968 takeown.exe 5312 takeown.exe 4136 takeown.exe 6132 takeown.exe 4732 takeown.exe 2500 takeown.exe 5980 takeown.exe 5268 takeown.exe 5732 takeown.exe 5020 takeown.exe 4520 takeown.exe 4204 takeown.exe 5140 takeown.exe 5672 takeown.exe 4156 takeown.exe 3608 takeown.exe 5416 takeown.exe 5480 takeown.exe 2580 takeown.exe 5720 takeown.exe 5188 takeown.exe 4532 takeown.exe 4888 takeown.exe 5752 takeown.exe 4776 takeown.exe 5464 takeown.exe 2576 takeown.exe 4292 takeown.exe 4972 takeown.exe 4348 takeown.exe 5828 takeown.exe 5668 takeown.exe 6136 takeown.exe 5684 takeown.exe 4456 takeown.exe 4740 takeown.exe 3972 takeown.exe 5220 takeown.exe 5556 takeown.exe 4644 takeown.exe 4668 takeown.exe 5676 takeown.exe 5756 takeown.exe 5160 takeown.exe 2512 takeown.exe 4392 takeown.exe 5024 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 26 IoCs
Processes:
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exedescription ioc Process File opened for modification C:\Users\Admin\Favorites\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Music\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Videos\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Libraries\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Searches\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Documents\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Pictures\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Music\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Desktop\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Videos\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Downloads\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Links\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Public\Documents\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2wiCh7aU64.exef5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exedescription ioc Process File opened (read-only) \??\Q: 2wiCh7aU64.exe File opened (read-only) \??\Z: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\V: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\I: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\E: 2wiCh7aU64.exe File opened (read-only) \??\H: 2wiCh7aU64.exe File opened (read-only) \??\W: 2wiCh7aU64.exe File opened (read-only) \??\Y: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\O: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\M: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\G: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\L: 2wiCh7aU64.exe File opened (read-only) \??\S: 2wiCh7aU64.exe File opened (read-only) \??\T: 2wiCh7aU64.exe File opened (read-only) \??\V: 2wiCh7aU64.exe File opened (read-only) \??\S: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\X: 2wiCh7aU64.exe File opened (read-only) \??\P: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\G: 2wiCh7aU64.exe File opened (read-only) \??\U: 2wiCh7aU64.exe File opened (read-only) \??\Y: 2wiCh7aU64.exe File opened (read-only) \??\U: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\Q: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\J: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\H: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\A: 2wiCh7aU64.exe File opened (read-only) \??\O: 2wiCh7aU64.exe File opened (read-only) \??\X: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\F: 2wiCh7aU64.exe File opened (read-only) \??\K: 2wiCh7aU64.exe File opened (read-only) \??\P: 2wiCh7aU64.exe File opened (read-only) \??\B: 2wiCh7aU64.exe File opened (read-only) \??\R: 2wiCh7aU64.exe File opened (read-only) \??\W: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\R: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\N: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\L: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\K: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\F: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\E: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\I: 2wiCh7aU64.exe File opened (read-only) \??\T: f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened (read-only) \??\M: 2wiCh7aU64.exe File opened (read-only) \??\N: 2wiCh7aU64.exe File opened (read-only) \??\Z: 2wiCh7aU64.exe File opened (read-only) \??\J: 2wiCh7aU64.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\lGbeWLy4.bmp" reg.exe -
Drops file in Program Files directory 64 IoCs
Processes:
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exedescription ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ja-jp\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\altDekstopCopyPasteHelper.js f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\ui-strings.js f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\zh-tw\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-ae\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fi-fi\ui-strings.js f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\org.eclipse.rcp_root_4.4.0.v20141007-2301 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_olv.css f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Windows Mail\en-US\WinMail.exe.mui f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\vlc.mo f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\main-selector.css f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\tr-tr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\feature.properties f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\ccloud.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prcr.x3d f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-api_zh_CN.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\faf_icons.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.RSA f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\example_icons2x.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\es-es\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.eclipse.nl_zh_4.4.0.v20140623020002.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\lua\http\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\editpdf.svg f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\ui-strings.js f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightRegular.ttf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\SearchEmail2x.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\ui-strings.js f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\PopDebug.rar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\bl.gif f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-focus.svg f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\appletrailers.luac f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_fi_135x40.svg f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyoptionaltools.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon_hover_2x.png f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\cs-cz\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ja-jp\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_filterselected-focus_32.svg f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Google\Chrome\Application\83.0.4103.106\Locales\zh-TW.pak f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Google\Update\1.3.35.452\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\hr-hr\#SNTG_README#.rtf f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\A12_Spinner_int.gif f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_organize_18.svg f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_zh_4.4.0.v20140623020002.jar f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 4932 vssadmin.exe -
Modifies Control Panel 5 IoCs
Processes:
reg.exereg.exereg.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\WallpaperStyle = "0" reg.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\TileWallpaper = "0" reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
2wiCh7aU64.exepid Process 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe 4604 2wiCh7aU64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
2wiCh7aU64.exepid Process 4604 2wiCh7aU64.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2wiCh7aU64.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exevssvc.exeWMIC.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid Process Token: SeDebugPrivilege 4604 2wiCh7aU64.exe Token: SeLoadDriverPrivilege 4604 2wiCh7aU64.exe Token: SeTakeOwnershipPrivilege 4776 takeown.exe Token: SeTakeOwnershipPrivilege 5020 takeown.exe Token: SeTakeOwnershipPrivilege 4108 takeown.exe Token: SeTakeOwnershipPrivilege 4520 takeown.exe Token: SeTakeOwnershipPrivilege 4456 takeown.exe Token: SeBackupPrivilege 4672 vssvc.exe Token: SeRestorePrivilege 4672 vssvc.exe Token: SeAuditPrivilege 4672 vssvc.exe Token: SeIncreaseQuotaPrivilege 5024 WMIC.exe Token: SeSecurityPrivilege 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 5024 WMIC.exe Token: SeLoadDriverPrivilege 5024 WMIC.exe Token: SeSystemProfilePrivilege 5024 WMIC.exe Token: SeSystemtimePrivilege 5024 WMIC.exe Token: SeProfSingleProcessPrivilege 5024 WMIC.exe Token: SeIncBasePriorityPrivilege 5024 WMIC.exe Token: SeCreatePagefilePrivilege 5024 WMIC.exe Token: SeBackupPrivilege 5024 WMIC.exe Token: SeRestorePrivilege 5024 WMIC.exe Token: SeShutdownPrivilege 5024 WMIC.exe Token: SeDebugPrivilege 5024 WMIC.exe Token: SeSystemEnvironmentPrivilege 5024 WMIC.exe Token: SeRemoteShutdownPrivilege 5024 WMIC.exe Token: SeUndockPrivilege 5024 WMIC.exe Token: SeManageVolumePrivilege 5024 WMIC.exe Token: 33 5024 WMIC.exe Token: 34 5024 WMIC.exe Token: 35 5024 WMIC.exe Token: 36 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 4212 takeown.exe Token: SeTakeOwnershipPrivilege 4732 takeown.exe Token: SeTakeOwnershipPrivilege 2500 takeown.exe Token: SeTakeOwnershipPrivilege 4136 takeown.exe Token: SeIncreaseQuotaPrivilege 5024 WMIC.exe Token: SeSecurityPrivilege 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 5024 WMIC.exe Token: SeLoadDriverPrivilege 5024 WMIC.exe Token: SeSystemProfilePrivilege 5024 WMIC.exe Token: SeSystemtimePrivilege 5024 WMIC.exe Token: SeProfSingleProcessPrivilege 5024 WMIC.exe Token: SeIncBasePriorityPrivilege 5024 WMIC.exe Token: SeCreatePagefilePrivilege 5024 WMIC.exe Token: SeBackupPrivilege 5024 WMIC.exe Token: SeRestorePrivilege 5024 WMIC.exe Token: SeShutdownPrivilege 5024 WMIC.exe Token: SeDebugPrivilege 5024 WMIC.exe Token: SeSystemEnvironmentPrivilege 5024 WMIC.exe Token: SeRemoteShutdownPrivilege 5024 WMIC.exe Token: SeUndockPrivilege 5024 WMIC.exe Token: SeManageVolumePrivilege 5024 WMIC.exe Token: 33 5024 WMIC.exe Token: 34 5024 WMIC.exe Token: 35 5024 WMIC.exe Token: 36 5024 WMIC.exe Token: SeTakeOwnershipPrivilege 4436 takeown.exe Token: SeTakeOwnershipPrivilege 4888 takeown.exe Token: SeTakeOwnershipPrivilege 4156 takeown.exe Token: SeTakeOwnershipPrivilege 4348 takeown.exe Token: SeTakeOwnershipPrivilege 1956 takeown.exe Token: SeTakeOwnershipPrivilege 4644 takeown.exe Token: SeTakeOwnershipPrivilege 2568 takeown.exe Token: SeTakeOwnershipPrivilege 3608 takeown.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.execmd.execmd.execmd.execmd.exe2wiCh7aU.exewscript.execmd.execmd.execmd.exedescription pid Process procid_target PID 3876 wrote to memory of 552 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 74 PID 3876 wrote to memory of 552 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 74 PID 3876 wrote to memory of 552 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 74 PID 3876 wrote to memory of 1324 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 76 PID 3876 wrote to memory of 1324 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 76 PID 3876 wrote to memory of 1324 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 76 PID 3876 wrote to memory of 4160 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 81 PID 3876 wrote to memory of 4160 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 81 PID 3876 wrote to memory of 4160 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 81 PID 3876 wrote to memory of 4172 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 82 PID 3876 wrote to memory of 4172 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 82 PID 3876 wrote to memory of 4172 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 82 PID 4160 wrote to memory of 4284 4160 cmd.exe 85 PID 4160 wrote to memory of 4284 4160 cmd.exe 85 PID 4160 wrote to memory of 4284 4160 cmd.exe 85 PID 4172 wrote to memory of 4296 4172 cmd.exe 86 PID 4172 wrote to memory of 4296 4172 cmd.exe 86 PID 4172 wrote to memory of 4296 4172 cmd.exe 86 PID 3876 wrote to memory of 4340 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 87 PID 3876 wrote to memory of 4340 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 87 PID 3876 wrote to memory of 4340 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 87 PID 4160 wrote to memory of 4428 4160 cmd.exe 90 PID 4160 wrote to memory of 4428 4160 cmd.exe 90 PID 4160 wrote to memory of 4428 4160 cmd.exe 90 PID 4160 wrote to memory of 4472 4160 cmd.exe 91 PID 4160 wrote to memory of 4472 4160 cmd.exe 91 PID 4160 wrote to memory of 4472 4160 cmd.exe 91 PID 4340 wrote to memory of 4492 4340 cmd.exe 92 PID 4340 wrote to memory of 4492 4340 cmd.exe 92 PID 4340 wrote to memory of 4492 4340 cmd.exe 92 PID 4340 wrote to memory of 4532 4340 cmd.exe 93 PID 4340 wrote to memory of 4532 4340 cmd.exe 93 PID 4340 wrote to memory of 4532 4340 cmd.exe 93 PID 4340 wrote to memory of 4556 4340 cmd.exe 94 PID 4340 wrote to memory of 4556 4340 cmd.exe 94 PID 4340 wrote to memory of 4556 4340 cmd.exe 94 PID 4556 wrote to memory of 4572 4556 cmd.exe 95 PID 4556 wrote to memory of 4572 4556 cmd.exe 95 PID 4556 wrote to memory of 4572 4556 cmd.exe 95 PID 4572 wrote to memory of 4604 4572 2wiCh7aU.exe 96 PID 4572 wrote to memory of 4604 4572 2wiCh7aU.exe 96 PID 3876 wrote to memory of 4616 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 97 PID 3876 wrote to memory of 4616 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 97 PID 3876 wrote to memory of 4616 3876 f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe 97 PID 4296 wrote to memory of 4636 4296 wscript.exe 98 PID 4296 wrote to memory of 4636 4296 wscript.exe 98 PID 4296 wrote to memory of 4636 4296 wscript.exe 98 PID 4636 wrote to memory of 4728 4636 cmd.exe 101 PID 4636 wrote to memory of 4728 4636 cmd.exe 101 PID 4636 wrote to memory of 4728 4636 cmd.exe 101 PID 4616 wrote to memory of 4756 4616 cmd.exe 102 PID 4616 wrote to memory of 4756 4616 cmd.exe 102 PID 4616 wrote to memory of 4756 4616 cmd.exe 102 PID 4616 wrote to memory of 4776 4616 cmd.exe 103 PID 4616 wrote to memory of 4776 4616 cmd.exe 103 PID 4616 wrote to memory of 4776 4616 cmd.exe 103 PID 4296 wrote to memory of 4800 4296 wscript.exe 104 PID 4296 wrote to memory of 4800 4296 wscript.exe 104 PID 4296 wrote to memory of 4800 4296 wscript.exe 104 PID 4800 wrote to memory of 4852 4800 cmd.exe 106 PID 4800 wrote to memory of 4852 4800 cmd.exe 106 PID 4800 wrote to memory of 4852 4800 cmd.exe 106 PID 4616 wrote to memory of 4872 4616 cmd.exe 107 PID 4616 wrote to memory of 4872 4616 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe"C:\Users\Admin\AppData\Local\Temp\f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe"1⤵
- Matrix Ransomware
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy /V /Y "C:\Users\Admin\AppData\Local\Temp\f5f038ae1208d34ee10c56c10fe2b9aa3b1d98892d92ce2a783490df72298770.exe" "C:\Users\Admin\AppData\Local\Temp\NWFKHNfX.exe"2⤵PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\NWFKHNfX.exe"C:\Users\Admin\AppData\Local\Temp\NWFKHNfX.exe" -n2⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\NWFKHNfX.exe"C:\Users\Admin\AppData\Local\Temp\NWFKHNfX.exe" "\\10.10.0.16\C$"3⤵PID:5252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lGbeWLy4.bmp" /f & reg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f & reg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lGbeWLy4.bmp" /f3⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
PID:4284
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v WallpaperStyle /t REG_SZ /d "0" /f3⤵
- Modifies Control Panel
PID:4428
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\Desktop" /v TileWallpaper /t REG_SZ /d "0" /f3⤵
- Modifies Control Panel
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wscript //B //Nologo "C:\Users\Admin\AppData\Roaming\G4usd8qK.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\wscript.exewscript //B //Nologo "C:\Users\Admin\AppData\Roaming\G4usd8qK.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\YHvVwRWQ.bat" /sc minute /mo 5 /RL HIGHEST /F4⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /tn DSHCA /tr "C:\Users\Admin\AppData\Roaming\YHvVwRWQ.bat" /sc minute /mo 5 /RL HIGHEST /F5⤵
- Creates scheduled task(s)
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Run /I /tn DSHCA4⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /I /tn DSHCA5⤵PID:4852
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db""2⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db" /E /G Admin:F /C3⤵PID:4492
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db"3⤵
- Modifies file permissions
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "qmgr.db" -nobanner3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "qmgr.db" -nobanner4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU64.exe2wiCh7aU.exe -accepteula "qmgr.db" -nobanner5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db""2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db" /E /G Admin:F /C3⤵PID:4756
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SmsInterceptStore.db" -nobanner3⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SmsInterceptStore.db" -nobanner4⤵
- Executes dropped EXE
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Mail\en-US\msoeres.dll.mui""2⤵PID:4952
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\en-US\msoeres.dll.mui" /E /G Admin:F /C3⤵PID:4996
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\en-US\msoeres.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "msoeres.dll.mui" -nobanner3⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "msoeres.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui""2⤵PID:3456
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui" /E /G Admin:F /C3⤵PID:4120
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "BrowserCore.exe.mui" -nobanner3⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "BrowserCore.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Mail\en-US\WinMail.exe.mui""2⤵PID:4448
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\en-US\WinMail.exe.mui" /E /G Admin:F /C3⤵PID:4252
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\en-US\WinMail.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "WinMail.exe.mui" -nobanner3⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "WinMail.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Security\BrowserCore\manifest.json""2⤵PID:4748
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\manifest.json" /E /G Admin:F /C3⤵PID:4552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\manifest.json"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "manifest.json" -nobanner3⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "manifest.json" -nobanner4⤵
- Executes dropped EXE
PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa""2⤵PID:5088
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:5008
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "classes.jsa" -nobanner3⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Mail\wab.exe""2⤵PID:4188
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\wab.exe" /E /G Admin:F /C3⤵PID:3440
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\wab.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "wab.exe" -nobanner3⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "wab.exe" -nobanner4⤵
- Executes dropped EXE
PID:4536
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets""2⤵PID:3572
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets" /E /G Admin:F /C3⤵PID:4476
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Workflow.Targets" -nobanner3⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Workflow.Targets" -nobanner4⤵
- Executes dropped EXE
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Mail\WinMail.exe""2⤵PID:4244
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\WinMail.exe" /E /G Admin:F /C3⤵PID:2484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\WinMail.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "WinMail.exe" -nobanner3⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "WinMail.exe" -nobanner4⤵
- Executes dropped EXE
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui""2⤵PID:4716
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:4976
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Mail\wabmig.exe""2⤵PID:856
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Mail\wabmig.exe" /E /G Admin:F /C3⤵PID:4584
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Mail\wabmig.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "wabmig.exe" -nobanner3⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "wabmig.exe" -nobanner4⤵
- Executes dropped EXE
PID:4324
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe""2⤵PID:4860
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe" /E /G Admin:F /C3⤵PID:4896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "MsSense.exe" -nobanner3⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "MsSense.exe" -nobanner4⤵
- Executes dropped EXE
PID:256
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui""2⤵PID:4528
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:2468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa""2⤵PID:4504
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa" /E /G Admin:F /C3⤵PID:4488
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Java\jre1.8.0_66\bin\server\classes.jsa"3⤵
- Modifies file permissions
PID:2440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "classes.jsa" -nobanner3⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "classes.jsa" -nobanner4⤵
- Executes dropped EXE
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets""2⤵PID:4768
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets" /E /G Admin:F /C3⤵PID:2392
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Workflow.VisualBasic.Targets" -nobanner3⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Workflow.VisualBasic.Targets" -nobanner4⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe""2⤵PID:4736
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe" /E /G Admin:F /C3⤵PID:4808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SenseSampleUploader.exe" -nobanner3⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SenseSampleUploader.exe" -nobanner4⤵
- Executes dropped EXE
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe""2⤵PID:272
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe" /E /G Admin:F /C3⤵PID:4184
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "BrowserCore.exe" -nobanner3⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "BrowserCore.exe" -nobanner4⤵
- Executes dropped EXE
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Defender Advanced Threat Protection\en-US\MsSense.exe.mui""2⤵PID:5116
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Defender Advanced Threat Protection\en-US\MsSense.exe.mui" /E /G Admin:F /C3⤵PID:4200
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Defender Advanced Threat Protection\en-US\MsSense.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "MsSense.exe.mui" -nobanner3⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "MsSense.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui""2⤵PID:4844
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:4468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H""2⤵PID:4912
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H" /E /G Admin:F /C3⤵PID:5032
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H"3⤵
- Modifies file permissions
PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Identity-H" -nobanner3⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Identity-H" -nobanner4⤵
- Executes dropped EXE
PID:276
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Photo Viewer\en-US\ImagingDevices.exe.mui""2⤵PID:4260
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Photo Viewer\en-US\ImagingDevices.exe.mui" /E /G Admin:F /C3⤵PID:4660
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Photo Viewer\en-US\ImagingDevices.exe.mui"3⤵
- Modifies file permissions
PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "ImagingDevices.exe.mui" -nobanner3⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "ImagingDevices.exe.mui" -nobanner4⤵
- Executes dropped EXE
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe""2⤵PID:248
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe" /E /G Admin:F /C3⤵PID:4232
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe"3⤵
- Modifies file permissions
PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SenseCncProxy.exe" -nobanner3⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SenseCncProxy.exe" -nobanner4⤵
- Executes dropped EXE
PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe""2⤵PID:2364
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe" /E /G Admin:F /C3⤵PID:4764
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Windows Photo Viewer\ImagingDevices.exe"3⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "ImagingDevices.exe" -nobanner3⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "ImagingDevices.exe" -nobanner4⤵
- Executes dropped EXE
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V""2⤵PID:4876
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V" /E /G Admin:F /C3⤵PID:4132
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V"3⤵
- Modifies file permissions
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Identity-V" -nobanner3⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Identity-V" -nobanner4⤵
- Executes dropped EXE
PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoViewer.dll.mui""2⤵PID:3848
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoViewer.dll.mui" /E /G Admin:F /C3⤵PID:4300
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoViewer.dll.mui"3⤵
- Modifies file permissions
PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "PhotoViewer.dll.mui" -nobanner3⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "PhotoViewer.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Mail\WinMail.exe""2⤵PID:5060
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Mail\WinMail.exe" /E /G Admin:F /C3⤵PID:4112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Mail\WinMail.exe"3⤵
- Modifies file permissions
PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "WinMail.exe" -nobanner3⤵PID:260
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "WinMail.exe" -nobanner4⤵
- Executes dropped EXE
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoAcq.dll.mui""2⤵PID:4400
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoAcq.dll.mui" /E /G Admin:F /C3⤵PID:4524
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Photo Viewer\en-US\PhotoAcq.dll.mui"3⤵
- Modifies file permissions
PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "PhotoAcq.dll.mui" -nobanner3⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "PhotoAcq.dll.mui" -nobanner4⤵
- Executes dropped EXE
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\device.png""2⤵PID:4988
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\device.png" /E /G Admin:F /C3⤵PID:1228
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\device.png"3⤵
- Modifies file permissions
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "device.png" -nobanner3⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "device.png" -nobanner4⤵
- Executes dropped EXE
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.cert.json""2⤵PID:5040
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.cert.json" /E /G Admin:F /C3⤵PID:4304
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.cert.json"3⤵
- Modifies file permissions
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "utc.cert.json" -nobanner3⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "utc.cert.json" -nobanner4⤵
- Executes dropped EXE
PID:4900
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013A.xsd""2⤵PID:4228
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013A.xsd" /E /G Admin:F /C3⤵PID:3632
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013A.xsd"3⤵
- Modifies file permissions
PID:3972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SettingsLocationTemplate2013A.xsd" -nobanner3⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SettingsLocationTemplate2013A.xsd" -nobanner4⤵
- Executes dropped EXE
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵
- Executes dropped EXE
PID:5128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateSetup.exe""2⤵PID:5152
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateSetup.exe" /E /G Admin:F /C3⤵PID:5200
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateSetup.exe"3⤵
- Modifies file permissions
PID:5220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "GoogleUpdateSetup.exe" -nobanner3⤵PID:5240
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "GoogleUpdateSetup.exe" -nobanner4⤵
- Executes dropped EXE
PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets""2⤵PID:5304
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets" /E /G Admin:F /C3⤵PID:5352
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.VisualBasic.Targets"3⤵
- Modifies file permissions
PID:5372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Workflow.VisualBasic.Targets" -nobanner3⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Workflow.VisualBasic.Targets" -nobanner4⤵PID:5408
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets""2⤵PID:5456
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets" /E /G Admin:F /C3⤵PID:5504
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\Workflow.Targets"3⤵
- Modifies file permissions
PID:5524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Workflow.Targets" -nobanner3⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Workflow.Targets" -nobanner4⤵PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe""2⤵PID:5608
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe" /E /G Admin:F /C3⤵PID:5656
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"3⤵
- Modifies file permissions
PID:5676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "ImagingDevices.exe" -nobanner3⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "ImagingDevices.exe" -nobanner4⤵PID:5712
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Data.bin""2⤵PID:5760
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Data.bin" /E /G Admin:F /C3⤵PID:5808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Data.bin"3⤵
- Modifies file permissions
PID:5828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "TileCache_100_0_Data.bin" -nobanner3⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "TileCache_100_0_Data.bin" -nobanner4⤵PID:5864
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\Settings\settings.dat""2⤵PID:5912
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\Settings\settings.dat" /E /G Admin:F /C3⤵PID:5960
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\Settings\settings.dat"3⤵
- Modifies file permissions
PID:5980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "settings.dat" -nobanner3⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "settings.dat" -nobanner4⤵PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\settings.dat""2⤵PID:6064
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\settings.dat" /E /G Admin:F /C3⤵PID:6112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\Settings\settings.dat"3⤵
- Modifies file permissions
PID:6132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "settings.dat" -nobanner3⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "settings.dat" -nobanner4⤵PID:2372
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\background.png""2⤵PID:4404
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\background.png" /E /G Admin:F /C3⤵PID:5236
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\background.png"3⤵
- Modifies file permissions
PID:5268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "background.png" -nobanner3⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "background.png" -nobanner4⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013.xsd""2⤵PID:5320
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013.xsd" /E /G Admin:F /C3⤵PID:5428
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\UEV\Templates\SettingsLocationTemplate2013.xsd"3⤵
- Modifies file permissions
PID:5440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SettingsLocationTemplate2013.xsd" -nobanner3⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SettingsLocationTemplate2013.xsd" -nobanner4⤵PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Mail\wab.exe""2⤵PID:5540
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Mail\wab.exe" /E /G Admin:F /C3⤵PID:5596
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Mail\wab.exe"3⤵
- Modifies file permissions
PID:5488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "wab.exe" -nobanner3⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "wab.exe" -nobanner4⤵PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.edb""2⤵PID:5728
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.edb" /E /G Admin:F /C3⤵PID:5640
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.edb"3⤵
- Modifies file permissions
PID:5620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "vedatamodel.edb" -nobanner3⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "vedatamodel.edb" -nobanner4⤵PID:5832
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Header.bin""2⤵PID:5908
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Header.bin" /E /G Admin:F /C3⤵PID:5920
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ShellExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Header.bin"3⤵PID:5964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "TileCache_100_0_Header.bin" -nobanner3⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "TileCache_100_0_Header.bin" -nobanner4⤵PID:6032
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png""2⤵PID:5916
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png" /E /G Admin:F /C3⤵PID:6140
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\watermark.png"3⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "watermark.png" -nobanner3⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "watermark.png" -nobanner4⤵PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Diagnosis\osver.txt""2⤵PID:4712
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Diagnosis\osver.txt" /E /G Admin:F /C3⤵PID:5192
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Diagnosis\osver.txt"3⤵
- Modifies file permissions
PID:5288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "osver.txt" -nobanner3⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "osver.txt" -nobanner4⤵PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edbres00002.jrs""2⤵PID:5452
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edbres00002.jrs" /E /G Admin:F /C3⤵PID:5520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edbres00002.jrs"3⤵
- Modifies file permissions
PID:5416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "edbres00002.jrs" -nobanner3⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "edbres00002.jrs" -nobanner4⤵PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\superbar.png""2⤵PID:5660
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\superbar.png" /E /G Admin:F /C3⤵PID:5548
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\superbar.png"3⤵
- Modifies file permissions
PID:5556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "superbar.png" -nobanner3⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "superbar.png" -nobanner4⤵PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edb.chk""2⤵PID:5860
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edb.chk" /E /G Admin:F /C3⤵PID:5740
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\edb.chk"3⤵
- Modifies file permissions
PID:5972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "edb.chk" -nobanner3⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "edb.chk" -nobanner4⤵PID:6004
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\overlay.png""2⤵PID:5792
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\overlay.png" /E /G Admin:F /C3⤵PID:5124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\overlay.png"3⤵
- Modifies file permissions
PID:5140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "overlay.png" -nobanner3⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "overlay.png" -nobanner4⤵PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.tracing.json""2⤵PID:5924
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.tracing.json" /E /G Admin:F /C3⤵PID:5208
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.tracing.json"3⤵
- Modifies file permissions
PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "utc.tracing.json" -nobanner3⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "utc.tracing.json" -nobanner4⤵PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.jfm""2⤵PID:5512
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.jfm" /E /G Admin:F /C3⤵PID:5600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.jfm"3⤵
- Modifies file permissions
PID:5480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "qmgr.jfm" -nobanner3⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "qmgr.jfm" -nobanner4⤵PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Mail\wabmig.exe""2⤵PID:5708
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Mail\wabmig.exe" /E /G Admin:F /C3⤵PID:5844
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Mail\wabmig.exe"3⤵
- Modifies file permissions
PID:5672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "wabmig.exe" -nobanner3⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "wabmig.exe" -nobanner4⤵PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Program Files (x86)\Windows Mail\en-US\msoeres.dll.mui""2⤵PID:6020
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Windows Mail\en-US\msoeres.dll.mui" /E /G Admin:F /C3⤵PID:5652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Windows Mail\en-US\msoeres.dll.mui"3⤵
- Modifies file permissions
PID:5756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "msoeres.dll.mui" -nobanner3⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "msoeres.dll.mui" -nobanner4⤵PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\AcroRdrDCUpd1901020069.msp""2⤵PID:5944
-
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\AcroRdrDCUpd1901020069.msp" /E /G Admin:F /C3⤵PID:5796
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\AcroRdrDCUpd1901020069.msp"3⤵
- Modifies file permissions
PID:5160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "AcroRdrDCUpd1901020069.msp" -nobanner3⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "AcroRdrDCUpd1901020069.msp" -nobanner4⤵PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\Microsoft\GameDVR\KnownGameList.bin""2⤵PID:5164
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Microsoft\GameDVR\KnownGameList.bin" /E /G Admin:F /C3⤵PID:5496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\Microsoft\GameDVR\KnownGameList.bin"3⤵
- Modifies file permissions
PID:5464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "KnownGameList.bin" -nobanner3⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "KnownGameList.bin" -nobanner4⤵PID:5576
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.jfm""2⤵PID:5376
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.jfm" /E /G Admin:F /C3⤵PID:5868
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\Admin\AppData\Local\TileDataLayer\Database\vedatamodel.jfm"3⤵
- Modifies file permissions
PID:5804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "vedatamodel.jfm" -nobanner3⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "vedatamodel.jfm" -nobanner4⤵PID:5824
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Data1.cab""2⤵PID:5852
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Data1.cab" /E /G Admin:F /C3⤵PID:4168
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Data1.cab"3⤵
- Modifies file permissions
PID:4992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "Data1.cab" -nobanner3⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "Data1.cab" -nobanner4⤵PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\Diagnosis\parse.dat""2⤵PID:5396
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Diagnosis\parse.dat" /E /G Admin:F /C3⤵PID:5332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Diagnosis\parse.dat"3⤵
- Modifies file permissions
PID:6136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "parse.dat" -nobanner3⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "parse.dat" -nobanner4⤵PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:5572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\L7SgSPj5.bat" "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.jfm""2⤵PID:5316
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.jfm" /E /G Admin:F /C3⤵PID:5388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.jfm"3⤵
- Modifies file permissions
PID:5968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2wiCh7aU.exe -accepteula "SmsInterceptStore.jfm" -nobanner3⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula "SmsInterceptStore.jfm" -nobanner4⤵PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\2wiCh7aU.exe2wiCh7aU.exe -accepteula -c Run -y -p extract -nobanner3⤵PID:6028
-
-