Analysis
-
max time kernel
1205s -
max time network
956s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
09/02/2022, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe
Resource
win10v2004-en-20220112
General
-
Target
FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe
-
Size
7.6MB
-
MD5
33f612338b6b5e6b4fe8cbb17208795c
-
SHA1
66535700bbce7f90d2add7c504bc0e0523d4d71d
-
SHA256
c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a
-
SHA512
7dfce042f5287858cf1d2942f6672084d01ad5677c7b47a1e9c2bcd4e0a2ea375ccd3a33676dc64dbe28edfe4fd19d25de5232c8fd23c0c7b24708c85b647fb2
Malware Config
Extracted
C:\re_ad_me.txt
http://zeonrefpbompx6rwdqa5hxgtp2cxgfmoymlli3azoanisze33pp3x3yd.onion/
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 812 created 2584 812 WerFault.exe 63 -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\FormatSearch.tiff.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\PingReceive.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\StartResize.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File opened for modification C:\Users\Admin\Pictures\BlockResolve.tiff FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File opened for modification C:\Users\Admin\Pictures\FormatSearch.tiff FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File opened for modification C:\Users\Admin\Pictures\ResolveReceive.tiff FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\BlockResolve.tiff.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\FindCompress.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\GroupTest.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\PingExit.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\ResolveReceive.tiff.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe File created C:\Users\Admin\Pictures\UnregisterBlock.raw.zeon FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe -
Loads dropped DLL 31 IoCs
pid Process 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\pqBxGx.jpg" FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3136 2584 WerFault.exe 63 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe 3456 schtasks.exe 1808 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 53 IoCs
pid Process 1272 taskkill.exe 1928 taskkill.exe 2844 taskkill.exe 2996 taskkill.exe 2456 taskkill.exe 3832 taskkill.exe 1036 taskkill.exe 3120 taskkill.exe 2156 taskkill.exe 1064 taskkill.exe 2912 taskkill.exe 3732 taskkill.exe 3632 taskkill.exe 1952 taskkill.exe 1704 taskkill.exe 3192 taskkill.exe 3232 taskkill.exe 3812 taskkill.exe 3608 taskkill.exe 2108 taskkill.exe 3928 taskkill.exe 1952 taskkill.exe 1052 taskkill.exe 636 taskkill.exe 1136 taskkill.exe 1548 taskkill.exe 3176 taskkill.exe 4020 taskkill.exe 3312 taskkill.exe 3608 taskkill.exe 1616 taskkill.exe 64 taskkill.exe 2504 taskkill.exe 3420 taskkill.exe 816 taskkill.exe 4036 taskkill.exe 1684 taskkill.exe 3000 taskkill.exe 1292 taskkill.exe 1272 taskkill.exe 2864 taskkill.exe 3864 taskkill.exe 812 taskkill.exe 1908 taskkill.exe 3396 taskkill.exe 2692 taskkill.exe 3992 taskkill.exe 2156 taskkill.exe 3624 taskkill.exe 3404 taskkill.exe 1136 taskkill.exe 3728 taskkill.exe 512 taskkill.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132890605745190612" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.006509" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.032556" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3744" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.003255" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3748" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.006566" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.013019" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3824" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3752" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "4.225218" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3768" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4052" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "3868" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.019534" svchost.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 820 NOTEPAD.EXE 3832 NOTEPAD.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 3136 WerFault.exe 3136 WerFault.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeDebugPrivilege 3728 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe Token: SeDebugPrivilege 512 taskkill.exe Token: SeDebugPrivilege 3232 taskkill.exe Token: SeDebugPrivilege 3812 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 1036 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 2844 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 3000 taskkill.exe Token: SeDebugPrivilege 2508 taskmgr.exe Token: SeSystemProfilePrivilege 2508 taskmgr.exe Token: SeCreateGlobalPrivilege 2508 taskmgr.exe Token: SeDebugPrivilege 2692 taskkill.exe Token: SeDebugPrivilege 3928 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 4020 taskkill.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 3312 Conhost.exe Token: SeDebugPrivilege 2996 net.exe Token: SeDebugPrivilege 3632 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 3608 taskkill.exe Token: SeDebugPrivilege 816 taskkill.exe Token: SeDebugPrivilege 3832 taskkill.exe Token: SeDebugPrivilege 636 taskkill.exe Token: SeDebugPrivilege 1616 taskkill.exe Token: SeDebugPrivilege 3624 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 1292 taskkill.exe Token: SeDebugPrivilege 3864 taskkill.exe Token: SeDebugPrivilege 3992 taskkill.exe Token: SeDebugPrivilege 64 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe Token: SeDebugPrivilege 1136 taskkill.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 3608 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 1136 taskkill.exe Token: SeDebugPrivilege 3120 taskkill.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 3396 taskkill.exe Token: SeDebugPrivilege 2504 taskkill.exe Token: SeDebugPrivilege 3420 taskkill.exe Token: SeDebugPrivilege 4036 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe Token: SeDebugPrivilege 3192 taskkill.exe Token: 33 2508 taskmgr.exe Token: SeIncBasePriorityPrivilege 2508 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe 2508 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1368 3880 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 57 PID 3880 wrote to memory of 1368 3880 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 57 PID 3880 wrote to memory of 1368 3880 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 57 PID 1368 wrote to memory of 3120 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 60 PID 1368 wrote to memory of 3120 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 60 PID 1368 wrote to memory of 3120 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 60 PID 3120 wrote to memory of 2752 3120 net.exe 62 PID 3120 wrote to memory of 2752 3120 net.exe 62 PID 3120 wrote to memory of 2752 3120 net.exe 62 PID 1368 wrote to memory of 3664 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 64 PID 1368 wrote to memory of 3664 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 64 PID 1368 wrote to memory of 3664 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 64 PID 1368 wrote to memory of 3728 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 67 PID 1368 wrote to memory of 3728 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 67 PID 1368 wrote to memory of 3728 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 67 PID 1368 wrote to memory of 640 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 71 PID 1368 wrote to memory of 640 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 71 PID 1368 wrote to memory of 640 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 71 PID 640 wrote to memory of 1748 640 net.exe 73 PID 640 wrote to memory of 1748 640 net.exe 73 PID 640 wrote to memory of 1748 640 net.exe 73 PID 1368 wrote to memory of 3040 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 74 PID 1368 wrote to memory of 3040 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 74 PID 1368 wrote to memory of 3040 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 74 PID 3040 wrote to memory of 3208 3040 net.exe 76 PID 3040 wrote to memory of 3208 3040 net.exe 76 PID 3040 wrote to memory of 3208 3040 net.exe 76 PID 1368 wrote to memory of 3608 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 77 PID 1368 wrote to memory of 3608 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 77 PID 1368 wrote to memory of 3608 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 77 PID 3608 wrote to memory of 3232 3608 net.exe 79 PID 3608 wrote to memory of 3232 3608 net.exe 79 PID 3608 wrote to memory of 3232 3608 net.exe 79 PID 1368 wrote to memory of 1548 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 80 PID 1368 wrote to memory of 1548 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 80 PID 1368 wrote to memory of 1548 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 80 PID 1368 wrote to memory of 724 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 82 PID 1368 wrote to memory of 724 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 82 PID 1368 wrote to memory of 724 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 82 PID 724 wrote to memory of 1588 724 net.exe 84 PID 724 wrote to memory of 1588 724 net.exe 84 PID 724 wrote to memory of 1588 724 net.exe 84 PID 1368 wrote to memory of 3176 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 85 PID 1368 wrote to memory of 3176 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 85 PID 1368 wrote to memory of 3176 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 85 PID 3176 wrote to memory of 1908 3176 net.exe 87 PID 3176 wrote to memory of 1908 3176 net.exe 87 PID 3176 wrote to memory of 1908 3176 net.exe 87 PID 1368 wrote to memory of 1272 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 88 PID 1368 wrote to memory of 1272 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 88 PID 1368 wrote to memory of 1272 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 88 PID 1368 wrote to memory of 512 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 90 PID 1368 wrote to memory of 512 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 90 PID 1368 wrote to memory of 512 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 90 PID 1368 wrote to memory of 2468 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 92 PID 1368 wrote to memory of 2468 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 92 PID 1368 wrote to memory of 2468 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 92 PID 2468 wrote to memory of 3712 2468 net.exe 94 PID 2468 wrote to memory of 3712 2468 net.exe 94 PID 2468 wrote to memory of 3712 2468 net.exe 94 PID 1368 wrote to memory of 1684 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 95 PID 1368 wrote to memory of 1684 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 95 PID 1368 wrote to memory of 1684 1368 FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe 95 PID 1684 wrote to memory of 3728 1684 net.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe"C:\Users\Admin\AppData\Local\Temp\FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe"C:\Users\Admin\AppData\Local\Temp\FEVcmTbQIx9X2VMynNFOZ3czRBKjZat7ep8l9asewByCR7QOrnm1ktm7SRGCG3yh_enc.exe"2⤵
- Modifies extensions of user files
- Loads dropped DLL
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\net.exenet stop /y sql3⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y sql4⤵PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y CCSF3⤵PID:3664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y CCSF4⤵PID:3092
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktop.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\net.exenet stop /y Exchange3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Exchange4⤵PID:1748
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y SNAC3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SNAC4⤵PID:3208
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y NetMsmq3⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y NetMsmq4⤵PID:3232
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im synctime.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\net.exenet stop /y xchange3⤵
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y xchange4⤵PID:1588
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y AcrSch3⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y AcrSch4⤵PID:1908
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im msaccess.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im visio.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SysWOW64\net.exenet stop /y EsgShKernel3⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EsgShKernel4⤵PID:3712
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Enterprise3⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Enterprise4⤵PID:3728
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y UIODetect3⤵PID:3736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y UIODetect4⤵PID:636
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y backup3⤵PID:3368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y backup4⤵PID:916
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfemms3⤵PID:3252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfemms4⤵PID:1344
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sqlbcoreservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mspub.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\net.exenet stop /y ESHASRV3⤵PID:1596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ESHASRV4⤵PID:2224
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im thunderbird.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\net.exenet stop /y Smcinst3⤵PID:3532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Smcinst4⤵PID:3588
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y acronis3⤵PID:64
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y acronis4⤵PID:4020
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sql.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im CNTAoSMgr.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mbamtray.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\net.exenet stop /y wbengine3⤵PID:2204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y wbengine4⤵PID:4036
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y WRSVC3⤵PID:812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y WRSVC4⤵PID:1008
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im tmlisten.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im PccNTMon.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\net.exenet stop /y Veeam3⤵PID:2448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Veeam4⤵PID:2564
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im winword.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\net.exenet stop /y ekrn3⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ekrn4⤵PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y DCAgent3⤵PID:3340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y DCAgent4⤵PID:312
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im oracle.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xchange.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\net.exenet stop /y ntrt3⤵PID:3652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y ntrt4⤵PID:1760
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im calc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\SysWOW64\net.exenet stop /y VeeamNFSSvc3⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y VeeamNFSSvc4⤵PID:1052
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktopqos.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sofos.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im encsvc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\net.exenet stop /y MsDts3⤵PID:2512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y MsDts4⤵PID:988
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y EhttpSrv3⤵PID:3928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EhttpSrv4⤵PID:3812
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im word.exe /f3⤵
- Kills process with taskkill
PID:3312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im virtual.exe /f3⤵
- Kills process with taskkill
PID:2996
-
-
C:\Windows\SysWOW64\net.exenet stop /y Sophos3⤵PID:3000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Sophos4⤵PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Afee3⤵PID:3748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Afee4⤵PID:3152
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Back3⤵PID:812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Back4⤵PID:2484
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y RESvc3⤵PID:4036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y RESvc4⤵PID:3832
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im raccine.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Antivirus3⤵PID:828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Antivirus4⤵PID:3188
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y W3S3⤵PID:3560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y W3S4⤵PID:3732
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im outlook.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\net.exenet stop /y Endpoint3⤵PID:3016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Endpoint4⤵PID:1596
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y EPUpdate3⤵PID:3700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EPUpdate4⤵PID:3652
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y klnagent3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y klnagent4⤵PID:2912
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y swi_3⤵PID:3000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4040
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y swi_4⤵PID:2880
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y task3⤵PID:3376
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3748
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y task4⤵PID:3732
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y AVP3⤵PID:2540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2484
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y AVP4⤵PID:3492
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y TrueKey3⤵PID:2512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y TrueKey4⤵PID:3392
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y vss3⤵PID:3928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vss4⤵PID:3464
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y EPSecurity3⤵PID:2100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y EPSecurity4⤵PID:872
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im backup.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im xfssvccon.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im veeam.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\net.exenet stop /y IMAP43⤵PID:3640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y IMAP44⤵PID:2216
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Backup.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\net.exenet stop /y vmwp3⤵PID:60
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vmwp4⤵PID:3864
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y mms3⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mms4⤵PID:1616
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Eraser3⤵PID:2204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Eraser4⤵PID:3588
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im wordpad.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Windows\SysWOW64\net.exenet stop /y KAVF3⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y KAVF4⤵PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y PDVF3⤵PID:3716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y PDVF4⤵PID:3396
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im zoolz.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocssd.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfefire3⤵PID:1516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfefire4⤵PID:3812
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im isqlplussvc.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im notepad.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im sqbcoreservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vmwp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\net.exenet stop /y Monitor3⤵PID:260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Monitor4⤵PID:1184
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im onenote.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im firefox.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mydesktopservice.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\net.exenet stop /y bedbg3⤵PID:3000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y bedbg4⤵PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y IISAdmin3⤵PID:3552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y IISAdmin4⤵PID:3016
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y FA_Scheduler3⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y FA_Scheduler4⤵PID:3652
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Ntrtscan.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\net.exenet stop /y mfevtp3⤵PID:372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y mfevtp4⤵PID:2488
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y SMTP3⤵PID:1576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SMTP4⤵PID:2220
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im tbirdconfig.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\net.exenet stop /y McShield3⤵PID:820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y McShield4⤵PID:3152
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im infopath.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\net.exenet stop /y SmcService3⤵PID:3528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y SmcService4⤵PID:3552
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y vmcomp3⤵PID:3396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y vmcomp4⤵PID:3652
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocomm.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im steam.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im powerpnt.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\net.exenet stop /y POP33⤵PID:3360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y POP34⤵PID:2316
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbeng.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im excel.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im vmcomp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\net.exenet stop /y tmlisten3⤵PID:3552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y tmlisten4⤵PID:1184
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im thebat.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\net.exenet stop /y veeam3⤵PID:3184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y veeam4⤵PID:3444
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbeng50.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Raccine.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\SysWOW64\net.exenet stop /y VeeamTransportSvc3⤵PID:3360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y VeeamTransportSvc4⤵PID:2240
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y MBAM3⤵PID:3656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y MBAM4⤵PID:432
-
-
-
C:\Windows\SysWOW64\net.exenet stop /y Report3⤵PID:1012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Report4⤵PID:3260
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ocautoupds.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im firefoxconfig.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\SysWOW64\net.exenet stop /y Backup3⤵PID:3348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop /y Backup4⤵PID:3640
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im dbsnmp.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6us /TR "CMD.EXE DEL /F /Q "{DNAME}\{PRNAME}" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:1576
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6us /TR "CMD.EXE DEL /F /Q "{DNAME}\{PRNAME}" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6tMpus /TR "CMD.EXE DEL /F /Q "{PATHIM}" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:2160
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6tMpus /TR "CMD.EXE DEL /F /Q "{PATHIM}" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:3456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /TN zE0xO6bGus /TR "CMD.EXE DEL /F /Q "C:\ProgramData\pqBxGx.jpg" >> NUL" /sc once /st 00:00 /RL HIGHEST3⤵PID:1784
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN zE0xO6bGus /TR "CMD.EXE DEL /F /Q "C:\ProgramData\pqBxGx.jpg" >> NUL" /sc once /st 00:00 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6us3⤵PID:3352
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6us4⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6tMpus3⤵PID:3120
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6tMpus4⤵PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Run /TN zE0xO6bGus3⤵PID:2124
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Run /TN zE0xO6bGus4⤵PID:2100
-
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:2584
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2584 -s 22082⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
PID:512
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3340
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 464 -p 2584 -ip 25841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:812
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\re_ad_me.txt1⤵
- Opens file in notepad (likely ransom note)
PID:820
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3752
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q {DNAME}\{PRNAME} >> NUL1⤵PID:2960
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q {PATHIM} >> NUL1⤵PID:1220
-
C:\Windows\system32\CMD.EXECMD.EXE DEL /F /Q C:\ProgramData\pqBxGx.jpg >> NUL1⤵PID:2216
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\re_ad_me.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:2900