Analysis
-
max time kernel
15s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
30-06-2021 00:02
Static task
static1
Behavioral task
behavioral1
Sample
8351A45BED6E3D3442D27DC11BD0226C.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8351A45BED6E3D3442D27DC11BD0226C.exe
Resource
win10v20210410
General
-
Target
8351A45BED6E3D3442D27DC11BD0226C.exe
-
Size
3.4MB
-
MD5
8351a45bed6e3d3442d27dc11bd0226c
-
SHA1
f32fce1bdd98889d50e6bb50fd1ab40eec339655
-
SHA256
3fa48c4223378b5ff4fbcff163b5a0fa89ff6980244cf9aaf01f5793c1ab9724
-
SHA512
0454da4a9b4383143418bba26c611fe5349887133c0c07eca4a1ea92d248a2cac3cbca7e2ba4ef61965241568a4fe1a271d7d54cac31539072e45d5a1f621599
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
redline
ServAni
87.251.71.195:82
Extracted
vidar
39.4
932
https://sergeevih43.tumblr.com
-
profile_id
932
Extracted
guloader
https://cdn.discordapp.com/attachments/859444299618582560/859474854498271232/Heck.bin
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral1/memory/604-198-0x0000000000270000-0x0000000000294000-memory.dmp family_redline behavioral1/memory/1016-204-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1016-205-0x0000000000417F26-mapping.dmp family_redline behavioral1/memory/1016-209-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/1844-174-0x0000000000310000-0x00000000003AD000-memory.dmp family_vidar behavioral1/memory/1844-179-0x0000000000400000-0x0000000000950000-memory.dmp family_vidar behavioral1/memory/2444-230-0x0000000000350000-0x00000000003ED000-memory.dmp family_vidar behavioral1/memory/2444-231-0x0000000000400000-0x0000000000950000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x0003000000013102-60.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-61.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-62.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-64.dat aspack_v212_v242 behavioral1/files/0x00030000000130fe-65.dat aspack_v212_v242 behavioral1/files/0x00030000000130fd-67.dat aspack_v212_v242 behavioral1/files/0x00030000000130fe-66.dat aspack_v212_v242 behavioral1/files/0x00030000000130fd-68.dat aspack_v212_v242 behavioral1/files/0x0003000000013100-73.dat aspack_v212_v242 behavioral1/files/0x0003000000013100-74.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-79.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-78.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-77.dat aspack_v212_v242 behavioral1/files/0x0003000000013102-76.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 1960 setup_install.exe 1484 sonia_2.exe 1504 sonia_1.exe 1556 sonia_4.exe 1844 sonia_3.exe 1060 sonia_6.exe 932 sonia_7.exe 1576 sonia_5.exe 1780 jfiag3g_gg.exe -
resource yara_rule behavioral1/files/0x00040000000130fd-165.dat upx behavioral1/files/0x00040000000130fd-163.dat upx behavioral1/files/0x00040000000130fd-167.dat upx behavioral1/files/0x00040000000130fd-169.dat upx behavioral1/files/0x00040000000130fd-168.dat upx behavioral1/files/0x00040000000130fd-162.dat upx -
Loads dropped DLL 37 IoCs
pid Process 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1960 setup_install.exe 1704 cmd.exe 1032 cmd.exe 1032 cmd.exe 772 cmd.exe 676 cmd.exe 676 cmd.exe 1484 sonia_2.exe 1484 sonia_2.exe 1492 cmd.exe 1556 sonia_4.exe 1556 sonia_4.exe 1840 cmd.exe 1840 cmd.exe 1844 sonia_3.exe 1844 sonia_3.exe 1060 sonia_6.exe 1060 sonia_6.exe 1188 cmd.exe 932 sonia_7.exe 932 sonia_7.exe 1556 sonia_4.exe 1556 sonia_4.exe 1780 jfiag3g_gg.exe 1780 jfiag3g_gg.exe 932 sonia_7.exe 1484 sonia_2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io 7 ipinfo.io 10 ip-api.com 201 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2676 1844 WerFault.exe 35 2244 2340 WerFault.exe 3044 2444 WerFault.exe 57 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3484 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 3096 taskkill.exe 3040 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1484 sonia_2.exe 1484 sonia_2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1576 sonia_5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 2036 wrote to memory of 1960 2036 8351A45BED6E3D3442D27DC11BD0226C.exe 26 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1704 1960 setup_install.exe 29 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 1032 1960 setup_install.exe 28 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 676 1960 setup_install.exe 30 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 772 1960 setup_install.exe 31 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1960 wrote to memory of 1188 1960 setup_install.exe 32 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1704 wrote to memory of 1504 1704 cmd.exe 33 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1032 wrote to memory of 1484 1032 cmd.exe 42 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1492 1960 setup_install.exe 34 PID 1960 wrote to memory of 1840 1960 setup_install.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\8351A45BED6E3D3442D27DC11BD0226C.exe"C:\Users\Admin\AppData\Local\Temp\8351A45BED6E3D3442D27DC11BD0226C.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_2.exesonia_2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_1.exesonia_1.exe4⤵
- Executes dropped EXE
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe3⤵
- Loads dropped DLL
PID:676 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_3.exesonia_3.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 9645⤵
- Program crash
PID:2676
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe3⤵
- Loads dropped DLL
PID:772 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_4.exesonia_4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2756
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe3⤵
- Loads dropped DLL
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_5.exesonia_5.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Users\Admin\AppData\Roaming\8511465.exe"C:\Users\Admin\AppData\Roaming\8511465.exe"5⤵PID:1164
-
-
C:\Users\Admin\AppData\Roaming\3189295.exe"C:\Users\Admin\AppData\Roaming\3189295.exe"5⤵PID:1836
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"6⤵PID:808
-
-
-
C:\Users\Admin\AppData\Roaming\6033319.exe"C:\Users\Admin\AppData\Roaming\6033319.exe"5⤵PID:604
-
-
C:\Users\Admin\AppData\Roaming\5143067.exe"C:\Users\Admin\AppData\Roaming\5143067.exe"5⤵PID:1776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe3⤵
- Loads dropped DLL
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_6.exesonia_6.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060 -
C:\Users\Admin\Documents\76eyEHL9q0NJEZaw_9OY8i5e.exe"C:\Users\Admin\Documents\76eyEHL9q0NJEZaw_9OY8i5e.exe"5⤵PID:2408
-
C:\Users\Admin\Documents\76eyEHL9q0NJEZaw_9OY8i5e.exe"C:\Users\Admin\Documents\76eyEHL9q0NJEZaw_9OY8i5e.exe"6⤵PID:748
-
-
-
C:\Users\Admin\Documents\qtVEh7sJYpitrBI2mFzF8kyq.exe"C:\Users\Admin\Documents\qtVEh7sJYpitrBI2mFzF8kyq.exe"5⤵PID:2444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 9566⤵
- Program crash
PID:3044
-
-
-
C:\Users\Admin\Documents\fEzchljZz5MXdtUoVeOlHxpJ.exe"C:\Users\Admin\Documents\fEzchljZz5MXdtUoVeOlHxpJ.exe"5⤵PID:2432
-
-
C:\Users\Admin\Documents\d5F5HYVrEiSqe8EpJHN5v_1w.exe"C:\Users\Admin\Documents\d5F5HYVrEiSqe8EpJHN5v_1w.exe"5⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im d5F5HYVrEiSqe8EpJHN5v_1w.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\d5F5HYVrEiSqe8EpJHN5v_1w.exe" & del C:\ProgramData\*.dll & exit6⤵PID:3236
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im d5F5HYVrEiSqe8EpJHN5v_1w.exe /f7⤵
- Kills process with taskkill
PID:3040
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 67⤵
- Delays execution with timeout.exe
PID:3484
-
-
-
-
C:\Users\Admin\Documents\irD5gOwWRGj7DqjdzUkmGe8Y.exe"C:\Users\Admin\Documents\irD5gOwWRGj7DqjdzUkmGe8Y.exe"5⤵PID:2744
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"6⤵PID:2964
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"6⤵PID:684
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl7⤵PID:3304
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"6⤵PID:2340
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"6⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:4004
-
-
-
-
C:\Users\Admin\Documents\lnoNawZpqKFKamzRBmmDy3Rk.exe"C:\Users\Admin\Documents\lnoNawZpqKFKamzRBmmDy3Rk.exe"5⤵PID:2732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru6⤵PID:2784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef6d34f50,0x7fef6d34f60,0x7fef6d34f707⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1452 /prefetch:27⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1500 /prefetch:87⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1512 /prefetch:87⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:17⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:17⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2620 /prefetch:17⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2808 /prefetch:17⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3064 /prefetch:87⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2788 /prefetch:17⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1260,2456444142259614918,17398162617411002303,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=708 /prefetch:17⤵PID:3212
-
-
-
-
C:\Users\Admin\Documents\fculuv9Ji9tk3m6G2SqwOwBn.exe"C:\Users\Admin\Documents\fculuv9Ji9tk3m6G2SqwOwBn.exe"5⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\38485648997.exe"6⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\38485648997.exe"C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\38485648997.exe"7⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\38485648997.exe"C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\38485648997.exe"8⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\1625011740708.exe"C:\Users\Admin\AppData\Local\Temp\1625011740708.exe"9⤵PID:4040
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\54411028949.exe" /mix6⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\54411028949.exe"C:\Users\Admin\AppData\Local\Temp\{DkLz-TJEgO-kjhD-9w3MM}\54411028949.exe" /mix7⤵PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "fculuv9Ji9tk3m6G2SqwOwBn.exe" /f & erase "C:\Users\Admin\Documents\fculuv9Ji9tk3m6G2SqwOwBn.exe" & exit6⤵PID:3832
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "fculuv9Ji9tk3m6G2SqwOwBn.exe" /f7⤵
- Kills process with taskkill
PID:3096
-
-
-
-
C:\Users\Admin\Documents\tEE_bWKJeDo2Q_7jDUigF0p8.exe"C:\Users\Admin\Documents\tEE_bWKJeDo2Q_7jDUigF0p8.exe"5⤵PID:2844
-
C:\Users\Admin\Documents\tEE_bWKJeDo2Q_7jDUigF0p8.exeC:\Users\Admin\Documents\tEE_bWKJeDo2Q_7jDUigF0p8.exe6⤵PID:3312
-
-
-
C:\Users\Admin\Documents\JUXYNpPA48ZoT3BbleGKQMoi.exe"C:\Users\Admin\Documents\JUXYNpPA48ZoT3BbleGKQMoi.exe"5⤵PID:2836
-
-
C:\Users\Admin\Documents\p8x1mJ0WCxfYbuCpdXV484gi.exe"C:\Users\Admin\Documents\p8x1mJ0WCxfYbuCpdXV484gi.exe"5⤵PID:2828
-
C:\Users\Admin\Documents\p8x1mJ0WCxfYbuCpdXV484gi.exeC:\Users\Admin\Documents\p8x1mJ0WCxfYbuCpdXV484gi.exe6⤵PID:3428
-
-
-
C:\Users\Admin\Documents\7hJSjdWtrqbkNyRwk0kRgUmQ.exe"C:\Users\Admin\Documents\7hJSjdWtrqbkNyRwk0kRgUmQ.exe"5⤵PID:2812
-
-
C:\Users\Admin\Documents\TJwHh5DcoPzjt8rF5zHqtEqD.exe"C:\Users\Admin\Documents\TJwHh5DcoPzjt8rF5zHqtEqD.exe"5⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:4016
-
-
-
C:\Users\Admin\Documents\WQSY8dhEVne2rNM73aLVQDh8.exe"C:\Users\Admin\Documents\WQSY8dhEVne2rNM73aLVQDh8.exe"5⤵PID:2980
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub6⤵PID:3276
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_8.exe3⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe3⤵
- Loads dropped DLL
PID:1840
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_7.exesonia_7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932 -
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_7.exeC:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_7.exe2⤵PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_7.exeC:\Users\Admin\AppData\Local\Temp\7zS4F7506D4\sonia_7.exe2⤵PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵PID:1352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 2921⤵
- Program crash
PID:2244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:3484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1576