Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/11/2024, 01:29

241112-bwgrxs1gnf 10

08/07/2021, 12:18

210708-8z6d5h8z2n 10

06/07/2021, 17:53

210706-g6we6sa7sa 10

19/06/2021, 18:17

210619-vr8bj2dzfn 10

17/06/2021, 21:39

210617-a9cvlnmrbx 10

11/06/2021, 17:26

210611-wvab1yw2tj 10

08/06/2021, 06:47

210608-qrbpch3y46 10

08/06/2021, 06:47

210608-64tndgm1ln 10

05/06/2021, 18:40

210605-cd6qpr55sx 10

04/06/2021, 11:56

210604-5c416rs3ns 10

Analysis

  • max time kernel
    22s
  • max time network
    171s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    29/05/2021, 14:23

Errors

Reason
Machine shutdown

General

  • Target

    Install2.exe

  • Size

    497KB

  • MD5

    41a5f4fd1ea7cac4aa94a87aebccfef0

  • SHA1

    0d0abf079413a4c773754bf4fda338dc5b9a8ddc

  • SHA256

    97e95e99fd499ec45a7c1d8683d5731ce5e7a8fb8b710622e578cd169a00d8d9

  • SHA512

    5ca14bda498f26efff4e1179969b8f2c25244063c7bf25f3ec20b5cd24b5be320bbfb8b3d0b2d66f5c5b415da777a766fece5f251a4247773c6cb991417fb75f

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 14 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Script User-Agent 7 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install2.exe
    "C:\Users\Admin\AppData\Local\Temp\Install2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\is-288T1.tmp\Install2.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-288T1.tmp\Install2.tmp" /SL5="$5002E,235791,152064,C:\Users\Admin\AppData\Local\Temp\Install2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:504
      • C:\Users\Admin\AppData\Local\Temp\is-USKCA.tmp\Ultra.exe
        "C:\Users\Admin\AppData\Local\Temp\is-USKCA.tmp\Ultra.exe" /S /UID=burnerch1
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3984
        • C:\Program Files\Microsoft Office 15\XADGSKWBLV\ultramediaburner.exe
          "C:\Program Files\Microsoft Office 15\XADGSKWBLV\ultramediaburner.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3412
          • C:\Users\Admin\AppData\Local\Temp\is-QLCK8.tmp\ultramediaburner.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-QLCK8.tmp\ultramediaburner.tmp" /SL5="$6005E,281924,62464,C:\Program Files\Microsoft Office 15\XADGSKWBLV\ultramediaburner.exe" /VERYSILENT
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2760
            • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
              "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
              6⤵
              • Executes dropped EXE
              PID:3928
        • C:\Users\Admin\AppData\Local\Temp\5b-20180-624-4c1bc-8d7e5bca17993\Huwaecybofo.exe
          "C:\Users\Admin\AppData\Local\Temp\5b-20180-624-4c1bc-8d7e5bca17993\Huwaecybofo.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          PID:3104
        • C:\Users\Admin\AppData\Local\Temp\5f-724e5-1ac-6a3a4-8b18237c519ea\Torovubaeqae.exe
          "C:\Users\Admin\AppData\Local\Temp\5f-724e5-1ac-6a3a4-8b18237c519ea\Torovubaeqae.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\o0qtdye0.sma\001.exe & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4248
            • C:\Users\Admin\AppData\Local\Temp\o0qtdye0.sma\001.exe
              C:\Users\Admin\AppData\Local\Temp\o0qtdye0.sma\001.exe
              6⤵
              • Executes dropped EXE
              PID:4400
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2jmzmz4b.hza\GcleanerEU.exe /eufive & exit
            5⤵
              PID:5000
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t3sddp35.kjq\installer.exe /qn CAMPAIGN="654" & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4316
              • C:\Users\Admin\AppData\Local\Temp\t3sddp35.kjq\installer.exe
                C:\Users\Admin\AppData\Local\Temp\t3sddp35.kjq\installer.exe /qn CAMPAIGN="654"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates connected drives
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:4444
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\t3sddp35.kjq\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\t3sddp35.kjq\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1622039169 /qn CAMPAIGN=""654"" " CAMPAIGN="654"
                  7⤵
                    PID:5028
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kz45zyio.h5z\gaoou.exe & exit
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4688
                • C:\Users\Admin\AppData\Local\Temp\kz45zyio.h5z\gaoou.exe
                  C:\Users\Admin\AppData\Local\Temp\kz45zyio.h5z\gaoou.exe
                  6⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4836
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    7⤵
                    • Executes dropped EXE
                    PID:5012
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                    7⤵
                      PID:5140
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lhuoizmp.etz\Setup3310.exe /Verysilent /subid=623 & exit
                  5⤵
                    PID:4276
                    • C:\Users\Admin\AppData\Local\Temp\lhuoizmp.etz\Setup3310.exe
                      C:\Users\Admin\AppData\Local\Temp\lhuoizmp.etz\Setup3310.exe /Verysilent /subid=623
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4464
                      • C:\Users\Admin\AppData\Local\Temp\is-U7MNA.tmp\Setup3310.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-U7MNA.tmp\Setup3310.tmp" /SL5="$5035C,138429,56832,C:\Users\Admin\AppData\Local\Temp\lhuoizmp.etz\Setup3310.exe" /Verysilent /subid=623
                        7⤵
                          PID:4844
                          • C:\Users\Admin\AppData\Local\Temp\is-UMD7F.tmp\Setup.exe
                            "C:\Users\Admin\AppData\Local\Temp\is-UMD7F.tmp\Setup.exe" /Verysilent
                            8⤵
                              PID:5224
                              • C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe
                                "C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"
                                9⤵
                                  PID:5696
                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                    10⤵
                                      PID:5596
                                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                      10⤵
                                        PID:4340
                                    • C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe
                                      "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"
                                      9⤵
                                        PID:5720
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit
                                          10⤵
                                            PID:6756
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /im RunWW.exe /f
                                              11⤵
                                              • Kills process with taskkill
                                              PID:6836
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /t 6
                                              11⤵
                                              • Delays execution with timeout.exe
                                              PID:7128
                                        • C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe
                                          "C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"
                                          9⤵
                                            PID:5836
                                          • C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe
                                            "C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"
                                            9⤵
                                              PID:5864
                                              • C:\Users\Admin\AppData\Local\Temp\is-D2TSG.tmp\LabPicV3.tmp
                                                "C:\Users\Admin\AppData\Local\Temp\is-D2TSG.tmp\LabPicV3.tmp" /SL5="$30412,140559,56832,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"
                                                10⤵
                                                  PID:6108
                                                  • C:\Users\Admin\AppData\Local\Temp\is-E81T3.tmp\___________23.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\is-E81T3.tmp\___________23.exe" /S /UID=lab214
                                                    11⤵
                                                      PID:5140
                                                      • C:\Program Files\Common Files\QNJLKBGRGZ\prolab.exe
                                                        "C:\Program Files\Common Files\QNJLKBGRGZ\prolab.exe" /VERYSILENT
                                                        12⤵
                                                          PID:5872
                                                          • C:\Users\Admin\AppData\Local\Temp\is-S96R3.tmp\prolab.tmp
                                                            "C:\Users\Admin\AppData\Local\Temp\is-S96R3.tmp\prolab.tmp" /SL5="$601CA,575243,216576,C:\Program Files\Common Files\QNJLKBGRGZ\prolab.exe" /VERYSILENT
                                                            13⤵
                                                              PID:5304
                                                          • C:\Users\Admin\AppData\Local\Temp\e1-d472a-f7c-cf6b3-7ab951d0f0aa2\Ruqekisefi.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\e1-d472a-f7c-cf6b3-7ab951d0f0aa2\Ruqekisefi.exe"
                                                            12⤵
                                                              PID:6120
                                                            • C:\Users\Admin\AppData\Local\Temp\42-23914-bac-51aa1-4e6f0aab00d22\Hegawaetyqu.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\42-23914-bac-51aa1-4e6f0aab00d22\Hegawaetyqu.exe"
                                                              12⤵
                                                                PID:5176
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3ucswbmg.jdh\001.exe & exit
                                                                  13⤵
                                                                    PID:3744
                                                                    • C:\Users\Admin\AppData\Local\Temp\3ucswbmg.jdh\001.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\3ucswbmg.jdh\001.exe
                                                                      14⤵
                                                                        PID:5788
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dl4oxxy4.vql\GcleanerEU.exe /eufive & exit
                                                                      13⤵
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:4276
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bhtmojzn.0gr\installer.exe /qn CAMPAIGN="654" & exit
                                                                      13⤵
                                                                        PID:5568
                                                                        • C:\Users\Admin\AppData\Local\Temp\bhtmojzn.0gr\installer.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\bhtmojzn.0gr\installer.exe /qn CAMPAIGN="654"
                                                                          14⤵
                                                                            PID:5076
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a1xv5ttd.jmo\gaoou.exe & exit
                                                                          13⤵
                                                                            PID:7048
                                                                            • C:\Users\Admin\AppData\Local\Temp\a1xv5ttd.jmo\gaoou.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\a1xv5ttd.jmo\gaoou.exe
                                                                              14⤵
                                                                                PID:6812
                                                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                  15⤵
                                                                                    PID:6200
                                                                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                    15⤵
                                                                                      PID:6688
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gmawgvfu.dtn\Setup3310.exe /Verysilent /subid=623 & exit
                                                                                  13⤵
                                                                                    PID:6392
                                                                                    • C:\Users\Admin\AppData\Local\Temp\gmawgvfu.dtn\Setup3310.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\gmawgvfu.dtn\Setup3310.exe /Verysilent /subid=623
                                                                                      14⤵
                                                                                        PID:4964
                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-AFF6H.tmp\Setup3310.tmp
                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-AFF6H.tmp\Setup3310.tmp" /SL5="$106E6,138429,56832,C:\Users\Admin\AppData\Local\Temp\gmawgvfu.dtn\Setup3310.exe" /Verysilent /subid=623
                                                                                          15⤵
                                                                                            PID:5216
                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-H7FO9.tmp\Setup.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-H7FO9.tmp\Setup.exe" /Verysilent
                                                                                              16⤵
                                                                                                PID:5880
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0d4udepa.4t1\google-game.exe & exit
                                                                                          13⤵
                                                                                            PID:3364
                                                                                            • C:\Users\Admin\AppData\Local\Temp\0d4udepa.4t1\google-game.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\0d4udepa.4t1\google-game.exe
                                                                                              14⤵
                                                                                                PID:6736
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l3edi04j.izt\005.exe & exit
                                                                                              13⤵
                                                                                                PID:1752
                                                                                                • C:\Users\Admin\AppData\Local\Temp\l3edi04j.izt\005.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\l3edi04j.izt\005.exe
                                                                                                  14⤵
                                                                                                    PID:6540
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nbiep53z.5yr\toolspab1.exe & exit
                                                                                                  13⤵
                                                                                                    PID:5500
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nbiep53z.5yr\toolspab1.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\nbiep53z.5yr\toolspab1.exe
                                                                                                      14⤵
                                                                                                        PID:5168
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nbiep53z.5yr\toolspab1.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\nbiep53z.5yr\toolspab1.exe
                                                                                                          15⤵
                                                                                                            PID:6956
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\20tfqyyb.njf\GcleanerWW.exe /mixone & exit
                                                                                                        13⤵
                                                                                                          PID:7120
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kbvi1341.wjl\installer.exe /qn CAMPAIGN="654" & exit
                                                                                                          13⤵
                                                                                                            PID:6848
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kbvi1341.wjl\installer.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\kbvi1341.wjl\installer.exe /qn CAMPAIGN="654"
                                                                                                              14⤵
                                                                                                                PID:6712
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yx0fpx3v.4o3\702564a0.exe & exit
                                                                                                              13⤵
                                                                                                                PID:6464
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\yx0fpx3v.4o3\702564a0.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\yx0fpx3v.4o3\702564a0.exe
                                                                                                                  14⤵
                                                                                                                    PID:5404
                                                                                                        • C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe
                                                                                                          "C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"
                                                                                                          9⤵
                                                                                                            PID:5912
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-7CIJ4.tmp\lylal220.tmp
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-7CIJ4.tmp\lylal220.tmp" /SL5="$303D6,140518,56832,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"
                                                                                                              10⤵
                                                                                                                PID:5172
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-M6PF4.tmp\___________RUb__________y.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-M6PF4.tmp\___________RUb__________y.exe" /S /UID=lylal220
                                                                                                                  11⤵
                                                                                                                    PID:4676
                                                                                                                    • C:\Program Files\MSBuild\AEGKCUOPSG\irecord.exe
                                                                                                                      "C:\Program Files\MSBuild\AEGKCUOPSG\irecord.exe" /VERYSILENT
                                                                                                                      12⤵
                                                                                                                        PID:4680
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-40STL.tmp\irecord.tmp
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-40STL.tmp\irecord.tmp" /SL5="$202F8,6139911,56832,C:\Program Files\MSBuild\AEGKCUOPSG\irecord.exe" /VERYSILENT
                                                                                                                          13⤵
                                                                                                                            PID:3480
                                                                                                                            • C:\Program Files (x86)\recording\i-record.exe
                                                                                                                              "C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu
                                                                                                                              14⤵
                                                                                                                                PID:4736
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a1-53a6a-8c1-77abf-e7eb9fd205712\Docepavafy.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a1-53a6a-8c1-77abf-e7eb9fd205712\Docepavafy.exe"
                                                                                                                            12⤵
                                                                                                                              PID:4364
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\23-1031f-fc5-f2ea1-1d391d45a99cb\Lodelyfiry.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\23-1031f-fc5-f2ea1-1d391d45a99cb\Lodelyfiry.exe"
                                                                                                                              12⤵
                                                                                                                                PID:6072
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ycesnk3i.toa\001.exe & exit
                                                                                                                                  13⤵
                                                                                                                                    PID:6776
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ycesnk3i.toa\001.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\ycesnk3i.toa\001.exe
                                                                                                                                      14⤵
                                                                                                                                        PID:6212
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fpsnrgdh.zyq\GcleanerEU.exe /eufive & exit
                                                                                                                                      13⤵
                                                                                                                                        PID:4168
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1t2qpjhu.5tq\installer.exe /qn CAMPAIGN="654" & exit
                                                                                                                                        13⤵
                                                                                                                                          PID:6604
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1t2qpjhu.5tq\installer.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\1t2qpjhu.5tq\installer.exe /qn CAMPAIGN="654"
                                                                                                                                            14⤵
                                                                                                                                              PID:2008
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s0cduboe.g2g\gaoou.exe & exit
                                                                                                                                            13⤵
                                                                                                                                              PID:7072
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\s0cduboe.g2g\gaoou.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\s0cduboe.g2g\gaoou.exe
                                                                                                                                                14⤵
                                                                                                                                                  PID:6368
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                                    15⤵
                                                                                                                                                      PID:4744
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                                      15⤵
                                                                                                                                                        PID:6704
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yqfsnmnm.1ah\Setup3310.exe /Verysilent /subid=623 & exit
                                                                                                                                                    13⤵
                                                                                                                                                      PID:5844
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\yqfsnmnm.1ah\Setup3310.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\yqfsnmnm.1ah\Setup3310.exe /Verysilent /subid=623
                                                                                                                                                        14⤵
                                                                                                                                                          PID:6372
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-28NRC.tmp\Setup3310.tmp
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-28NRC.tmp\Setup3310.tmp" /SL5="$80522,138429,56832,C:\Users\Admin\AppData\Local\Temp\yqfsnmnm.1ah\Setup3310.exe" /Verysilent /subid=623
                                                                                                                                                            15⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            PID:4844
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-TA0A6.tmp\Setup.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-TA0A6.tmp\Setup.exe" /Verysilent
                                                                                                                                                              16⤵
                                                                                                                                                                PID:5072
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lzwqf5bg.fxr\google-game.exe & exit
                                                                                                                                                          13⤵
                                                                                                                                                            PID:6980
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\lzwqf5bg.fxr\google-game.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\lzwqf5bg.fxr\google-game.exe
                                                                                                                                                              14⤵
                                                                                                                                                                PID:4476
                                                                                                                                                                • C:\Windows\SysWOW64\rUNdlL32.eXe
                                                                                                                                                                  "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl
                                                                                                                                                                  15⤵
                                                                                                                                                                    PID:4272
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qmfm1tvs.4g3\005.exe & exit
                                                                                                                                                                13⤵
                                                                                                                                                                  PID:6300
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\qmfm1tvs.4g3\005.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\qmfm1tvs.4g3\005.exe
                                                                                                                                                                    14⤵
                                                                                                                                                                      PID:7028
                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aow4etrc.uae\toolspab1.exe & exit
                                                                                                                                                                    13⤵
                                                                                                                                                                      PID:7040
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aow4etrc.uae\toolspab1.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\aow4etrc.uae\toolspab1.exe
                                                                                                                                                                        14⤵
                                                                                                                                                                          PID:6432
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\aow4etrc.uae\toolspab1.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\aow4etrc.uae\toolspab1.exe
                                                                                                                                                                            15⤵
                                                                                                                                                                              PID:7108
                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p2kkkpaa.szb\GcleanerWW.exe /mixone & exit
                                                                                                                                                                          13⤵
                                                                                                                                                                            PID:6252
                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g4gzjxfb.1uu\installer.exe /qn CAMPAIGN="654" & exit
                                                                                                                                                                            13⤵
                                                                                                                                                                              PID:6596
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\g4gzjxfb.1uu\installer.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\g4gzjxfb.1uu\installer.exe /qn CAMPAIGN="654"
                                                                                                                                                                                14⤵
                                                                                                                                                                                  PID:5640
                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yubycxun.qcm\702564a0.exe & exit
                                                                                                                                                                                13⤵
                                                                                                                                                                                  PID:5396
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\yubycxun.qcm\702564a0.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\yubycxun.qcm\702564a0.exe
                                                                                                                                                                                    14⤵
                                                                                                                                                                                      PID:5836
                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 480
                                                                                                                                                                                        15⤵
                                                                                                                                                                                        • Program crash
                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                        PID:4844
                                                                                                                                                                          • C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe
                                                                                                                                                                            "C:\Program Files (x86)\Data Finder\Versium Research\BarSetpFile.exe"
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:5956
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\7261525.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\7261525.exe"
                                                                                                                                                                                10⤵
                                                                                                                                                                                  PID:5932
                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\7959793.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\7959793.exe"
                                                                                                                                                                                  10⤵
                                                                                                                                                                                    PID:5652
                                                                                                                                                                                    • C:\ProgramData\Windows Host\Windows Host.exe
                                                                                                                                                                                      "C:\ProgramData\Windows Host\Windows Host.exe"
                                                                                                                                                                                      11⤵
                                                                                                                                                                                        PID:5240
                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\3030543.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\3030543.exe"
                                                                                                                                                                                      10⤵
                                                                                                                                                                                        PID:5768
                                                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r5do0mmt.tlc\google-game.exe & exit
                                                                                                                                                                              5⤵
                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                              PID:4920
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\r5do0mmt.tlc\google-game.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\r5do0mmt.tlc\google-game.exe
                                                                                                                                                                                6⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                PID:5068
                                                                                                                                                                                • C:\Windows\SysWOW64\rUNdlL32.eXe
                                                                                                                                                                                  "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl
                                                                                                                                                                                  7⤵
                                                                                                                                                                                    PID:5256
                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\04rgli33.iob\005.exe & exit
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:3992
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\04rgli33.iob\005.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\04rgli33.iob\005.exe
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:5400
                                                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2mf1izj4.0co\toolspab1.exe & exit
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:5484
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\2mf1izj4.0co\toolspab1.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\2mf1izj4.0co\toolspab1.exe
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:5856
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\2mf1izj4.0co\toolspab1.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\2mf1izj4.0co\toolspab1.exe
                                                                                                                                                                                            7⤵
                                                                                                                                                                                              PID:6364
                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\eopt1wr4.hjr\GcleanerWW.exe /mixone & exit
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:5896
                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ok3xb2dl.dcf\installer.exe /qn CAMPAIGN="654" & exit
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:740
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ok3xb2dl.dcf\installer.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\ok3xb2dl.dcf\installer.exe /qn CAMPAIGN="654"
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:6932
                                                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lldzcjso.zyc\702564a0.exe & exit
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:6364
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\lldzcjso.zyc\702564a0.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\lldzcjso.zyc\702564a0.exe
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:6852
                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:2644
                                                                                                                                                                                          • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                            C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                            PID:2060
                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                                            PID:4800
                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:5040
                                                                                                                                                                                          • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                            C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Enumerates connected drives
                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                                            PID:4108
                                                                                                                                                                                            • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                              C:\Windows\syswow64\MsiExec.exe -Embedding 7571458A0078490D664881581F5838AD C
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                              PID:3996
                                                                                                                                                                                            • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                              C:\Windows\syswow64\MsiExec.exe -Embedding 3FCD436CCB1C7B08CF9760C8D2218E6B
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:5164
                                                                                                                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                  "C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                  PID:5508
                                                                                                                                                                                              • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                C:\Windows\syswow64\MsiExec.exe -Embedding 9375E4B559294A2F3DFBC8638F861808 E Global\MSI0000
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:6660
                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:5368
                                                                                                                                                                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:6016
                                                                                                                                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:5996
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:6244
                                                                                                                                                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:3632
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\26AE.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\26AE.exe
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:4852
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\26AE.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\26AE.exe
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:2780
                                                                                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                  icacls "C:\Users\Admin\AppData\Local\44518299-eb34-4c1e-83a3-4471e4be196d" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                  PID:5272
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\26AE.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\26AE.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:6524
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\4FE2.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\4FE2.exe
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:1292
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\923B.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\923B.exe
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1928
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\jssrjbu
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\jssrjbu
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:5068
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\rcsrjbu
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\rcsrjbu
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:7008

                                                                                                                                                                                                                      Network

                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                      • memory/504-119-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/964-297-0x0000028D5D180000-0x0000028D5D1F0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/1064-285-0x0000021D7A270000-0x0000021D7A2E0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/1236-319-0x00000145B3CA0000-0x00000145B3D10000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/1368-307-0x00000235F9560000-0x00000235F95D0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/1764-148-0x00000000031C2000-0x00000000031C4000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/1764-146-0x00000000031C0000-0x00000000031C2000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/1764-151-0x00000000031C5000-0x00000000031C6000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/1824-313-0x0000018F53040000-0x0000018F530B0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/2336-277-0x0000023ABF850000-0x0000023ABF8C0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/2376-267-0x000001565C440000-0x000001565C4B0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/2536-283-0x0000018121CD0000-0x0000018121D40000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/2760-131-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/3104-144-0x0000000002FC0000-0x0000000002FC2000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/3412-126-0x0000000000400000-0x0000000000416000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        88KB

                                                                                                                                                                                                                      • memory/3724-262-0x000001D020F30000-0x000001D020F7B000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        300KB

                                                                                                                                                                                                                      • memory/3724-266-0x000001D020FF0000-0x000001D021060000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/3928-145-0x00000000012D0000-0x00000000012D2000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/3928-150-0x00000000012D5000-0x00000000012D7000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/3928-149-0x00000000012D4000-0x00000000012D5000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/3928-147-0x00000000012D2000-0x00000000012D4000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/3984-123-0x00000000024B0000-0x00000000024B2000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/4044-114-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        172KB

                                                                                                                                                                                                                      • memory/4400-157-0x00000000001F0000-0x0000000000200000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                      • memory/4400-158-0x00000000009F0000-0x0000000000A02000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        72KB

                                                                                                                                                                                                                      • memory/4464-181-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        80KB

                                                                                                                                                                                                                      • memory/4844-209-0x00000000050B0000-0x00000000050B1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-199-0x0000000005010000-0x0000000005011000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-210-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-207-0x0000000005090000-0x0000000005091000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-212-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-208-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-206-0x0000000005080000-0x0000000005081000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-203-0x0000000005050000-0x0000000005051000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-205-0x0000000005070000-0x0000000005071000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-202-0x0000000005040000-0x0000000005041000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-201-0x0000000005030000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-211-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-198-0x0000000005000000-0x0000000005001000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-214-0x0000000005100000-0x0000000005101000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-215-0x0000000005110000-0x0000000005111000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-192-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-213-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-204-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/4844-190-0x0000000003930000-0x000000000396C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        240KB

                                                                                                                                                                                                                      • memory/4844-200-0x0000000005020000-0x0000000005021000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5172-314-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5256-245-0x0000000004144000-0x0000000004245000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        1.0MB

                                                                                                                                                                                                                      • memory/5256-246-0x0000000000CB0000-0x0000000000D0C000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        368KB

                                                                                                                                                                                                                      • memory/5368-324-0x0000020097760000-0x00000200977D0000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        448KB

                                                                                                                                                                                                                      • memory/5400-306-0x0000000000490000-0x000000000053E000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        696KB

                                                                                                                                                                                                                      • memory/5400-288-0x00000000001F0000-0x0000000000200000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                      • memory/5652-346-0x000000000DE50000-0x000000000DE51000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5652-337-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5652-341-0x000000000E270000-0x000000000E271000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5652-348-0x00000000029C0000-0x00000000029C1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5652-340-0x0000000005210000-0x0000000005220000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                      • memory/5652-339-0x0000000005180000-0x0000000005181000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5696-309-0x00000000001F0000-0x000000000084F000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        6.4MB

                                                                                                                                                                                                                      • memory/5768-351-0x0000000004CB0000-0x0000000004CEA000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        232KB

                                                                                                                                                                                                                      • memory/5768-347-0x00000000051D0000-0x00000000051D1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5768-353-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5768-344-0x0000000000B80000-0x0000000000B81000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5864-291-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        80KB

                                                                                                                                                                                                                      • memory/5912-295-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        80KB

                                                                                                                                                                                                                      • memory/5932-334-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5932-343-0x00000000053C0000-0x00000000053EC000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        176KB

                                                                                                                                                                                                                      • memory/5956-300-0x0000000000F20000-0x0000000000F21000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB

                                                                                                                                                                                                                      • memory/5956-318-0x000000001BD70000-0x000000001BD72000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                      • memory/5956-322-0x0000000001360000-0x000000000137D000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        116KB

                                                                                                                                                                                                                      • memory/6108-312-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                        4KB