Overview
overview
10Static
static
8 (1).exe
windows7_x64
108 (1).exe
windows10_x64
108 (10).exe
windows7_x64
108 (10).exe
windows10_x64
108 (11).exe
windows7_x64
108 (11).exe
windows10_x64
108 (12).exe
windows7_x64
108 (12).exe
windows10_x64
108 (13).exe
windows7_x64
108 (13).exe
windows10_x64
108 (14).exe
windows7_x64
108 (14).exe
windows10_x64
108 (15).exe
windows7_x64
108 (15).exe
windows10_x64
108 (16).exe
windows7_x64
108 (16).exe
windows10_x64
108 (17).exe
windows7_x64
108 (17).exe
windows10_x64
108 (18).exe
windows7_x64
108 (18).exe
windows10_x64
108 (19).exe
windows7_x64
108 (19).exe
windows10_x64
108 (2).exe
windows7_x64
108 (2).exe
windows10_x64
108 (20).exe
windows7_x64
108 (20).exe
windows10_x64
108 (21).exe
windows7_x64
108 (21).exe
windows10_x64
108 (22).exe
windows7_x64
108 (22).exe
windows10_x64
108 (23).exe
windows7_x64
108 (23).exe
windows10_x64
10Resubmissions
13/08/2021, 10:16
210813-wpta271jdx 1008/08/2021, 23:00
210808-fgs5g9pxfs 1007/08/2021, 23:12
210807-g2jw1lmd4a 1007/08/2021, 16:10
210807-51nhct4kfx 1006/08/2021, 23:43
210806-gc2271nxwj 1006/08/2021, 06:00
210806-f443x39x8a 1005/08/2021, 17:08
210805-97y6banvvx 1004/08/2021, 17:25
210804-hkxx2ntr8x 1004/08/2021, 12:12
210804-rjbg4b4y7n 1003/08/2021, 17:12
210803-r2h7ytjwqj 10Analysis
-
max time kernel
51s -
max time network
1856s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29/07/2021, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
8 (1).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8 (1).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
8 (10).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
8 (10).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
8 (11).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
8 (11).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
8 (12).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
8 (12).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
8 (13).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
8 (13).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
8 (14).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
8 (14).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
8 (15).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
8 (15).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
8 (16).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
8 (16).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
8 (17).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
8 (17).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
8 (18).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
8 (18).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
8 (19).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
8 (19).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
8 (2).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
8 (2).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
8 (20).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
8 (20).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
8 (21).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
8 (21).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
8 (22).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
8 (22).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
8 (23).exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
8 (23).exe
Resource
win10v20210408
General
-
Target
8 (21).exe
-
Size
3.0MB
-
MD5
bb072cad921aa5ce8b97706ce01bc570
-
SHA1
18bf034906c1341b7817e7361ad27a4425d820bd
-
SHA256
817a50d00909383bbef41e6f4e61b527d55f0873bcf745b29dbba75f52fe2e97
-
SHA512
d40e5f77d882ed29bd9de5a6848072e2f81cd02176955e2b1a4aedcdf4eb687d77bebe33cef0c7d702bc828181755f86e2564523d476adbb785f396a5ce1d474
Malware Config
Extracted
vidar
39.6
933
https://sslamlssa1.tumblr.com/
-
profile_id
933
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 1848 rUNdlL32.eXe 79 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral27/memory/900-260-0x0000000000418836-mapping.dmp family_redline behavioral27/memory/892-262-0x0000000000418846-mapping.dmp family_redline -
suricata: ET MALWARE GCleaner Downloader Activity M1
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Nirsoft 1 IoCs
resource yara_rule behavioral27/memory/2836-230-0x0000000000400000-0x0000000000455000-memory.dmp Nirsoft -
Vidar Stealer 2 IoCs
resource yara_rule behavioral27/memory/1640-157-0x0000000000900000-0x000000000099D000-memory.dmp family_vidar behavioral27/memory/1640-161-0x0000000000400000-0x00000000008F2000-memory.dmp family_vidar -
resource yara_rule behavioral27/files/0x000300000001315e-68.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-70.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-69.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-72.dat aspack_v212_v242 behavioral27/files/0x000300000001315a-75.dat aspack_v212_v242 behavioral27/files/0x000300000001315a-76.dat aspack_v212_v242 behavioral27/files/0x0003000000013159-77.dat aspack_v212_v242 behavioral27/files/0x0003000000013159-78.dat aspack_v212_v242 behavioral27/files/0x000300000001315c-81.dat aspack_v212_v242 behavioral27/files/0x000300000001315c-82.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-84.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-85.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-87.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-86.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-160.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-159.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-158.dat aspack_v212_v242 behavioral27/files/0x000300000001315e-170.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 848 setup_installer.exe 316 setup_install.exe 1960 sonia_1.exe 1640 sonia_3.exe 1564 sonia_4.exe 1320 sonia_2.exe 1368 sonia_5.exe 1364 sonia_6.exe 1068 jfiag3g_gg.exe 2028 XN2GoTLmPPzxVHpCFMGc0LPu.exe 2024 FY8_BpN95wpRcYqnjEcI0dLT.exe 1164 6Ltht0BzS_gXI3ibSS0IsFLf.exe 1828 KZvqShJ9r4xiJVc_UVFdJBCR.exe 1952 EXgOyzYGTmbrN6E1RUlwawJR.exe 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe 864 LrDJtjZxoUhrCgBPKoA3j1Ve.exe 2052 tT3zRPobCkhQwzkaTalybj9u.exe 2140 dDBJ8YwgEJDByPJuNMNmre8Q.exe 2192 VHPnnt3DYjtIKlU8mLwO7AHY.exe 2216 XaS9QUUrhNj21ykaBuCx53yR.exe 2204 4OpcfTducy9hrCU6bSiXKPfo.exe 2248 p9lbRFUuZxPe4_3PMNzzwxv7.exe -
resource yara_rule behavioral27/files/0x0005000000013162-163.dat upx behavioral27/files/0x0005000000013162-169.dat upx behavioral27/files/0x0005000000013162-168.dat upx behavioral27/files/0x0005000000013162-167.dat upx behavioral27/files/0x0005000000013162-165.dat upx behavioral27/files/0x0005000000013162-162.dat upx -
resource yara_rule behavioral27/memory/2680-223-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect behavioral27/memory/2680-220-0x0000000000400000-0x000000000064F000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dDBJ8YwgEJDByPJuNMNmre8Q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dDBJ8YwgEJDByPJuNMNmre8Q.exe -
Loads dropped DLL 64 IoCs
pid Process 520 8 (21).exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 848 setup_installer.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 316 setup_install.exe 1252 cmd.exe 1252 cmd.exe 2020 cmd.exe 2020 cmd.exe 1996 cmd.exe 2016 cmd.exe 1684 cmd.exe 1684 cmd.exe 1840 cmd.exe 1640 sonia_3.exe 1640 sonia_3.exe 1368 sonia_5.exe 1368 sonia_5.exe 1364 sonia_6.exe 1364 sonia_6.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1364 sonia_6.exe 1364 sonia_6.exe 1068 jfiag3g_gg.exe 1068 jfiag3g_gg.exe 1520 WerFault.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1828 KZvqShJ9r4xiJVc_UVFdJBCR.exe 1828 KZvqShJ9r4xiJVc_UVFdJBCR.exe 1952 EXgOyzYGTmbrN6E1RUlwawJR.exe 1952 EXgOyzYGTmbrN6E1RUlwawJR.exe 1368 taskkill.exe 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 1368 taskkill.exe 2216 XaS9QUUrhNj21ykaBuCx53yR.exe 2216 XaS9QUUrhNj21ykaBuCx53yR.exe -
resource yara_rule behavioral27/memory/2140-210-0x0000000000190000-0x0000000000191000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" sonia_6.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dDBJ8YwgEJDByPJuNMNmre8Q.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io 12 ip-api.com 290 ip-api.com 2 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2140 dDBJ8YwgEJDByPJuNMNmre8Q.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1520 316 WerFault.exe 30 2532 1640 WerFault.exe 39 2788 2680 WerFault.exe 68 1308 2204 WerFault.exe 64 -
Delays execution with timeout.exe 2 IoCs
pid Process 1628 timeout.exe 2300 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1368 taskkill.exe 1072 taskkill.exe 3448 taskkill.exe 3336 taskkill.exe 2768 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 sonia_4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 sonia_4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 sonia_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 sonia_3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 sonia_3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C sonia_4.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3904 PING.EXE 524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe 1520 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1564 sonia_4.exe Token: SeDebugPrivilege 1520 WerFault.exe Token: SeCreateTokenPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeAssignPrimaryTokenPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeLockMemoryPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeIncreaseQuotaPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeMachineAccountPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeTcbPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeSecurityPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeTakeOwnershipPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeLoadDriverPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeSystemProfilePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeSystemtimePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeProfSingleProcessPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeIncBasePriorityPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeCreatePagefilePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeCreatePermanentPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeBackupPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeRestorePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeShutdownPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeDebugPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeAuditPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeSystemEnvironmentPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeChangeNotifyPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeRemoteShutdownPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeUndockPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeSyncAgentPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeEnableDelegationPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeManageVolumePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeImpersonatePrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: SeCreateGlobalPrivilege 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: 31 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: 32 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: 33 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: 34 2052 tT3zRPobCkhQwzkaTalybj9u.exe Token: 35 2052 tT3zRPobCkhQwzkaTalybj9u.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe 1612 fWdKz3EuYHJn48bJrSL8nFVb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 520 wrote to memory of 848 520 8 (21).exe 29 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 848 wrote to memory of 316 848 setup_installer.exe 30 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1252 316 setup_install.exe 32 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 1684 316 setup_install.exe 33 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 2020 316 setup_install.exe 34 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 316 wrote to memory of 1996 316 setup_install.exe 35 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 1252 wrote to memory of 1960 1252 cmd.exe 36 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 2016 316 setup_install.exe 37 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 316 wrote to memory of 1840 316 setup_install.exe 38 PID 2020 wrote to memory of 1640 2020 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8 (21).exe"C:\Users\Admin\AppData\Local\Temp\8 (21).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0530D795\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_1.exesonia_1.exe5⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_1.exe" -a6⤵PID:720
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_2.exesonia_2.exe5⤵
- Executes dropped EXE
PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_3.exesonia_3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 10006⤵
- Program crash
PID:2532
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_4.exesonia_4.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_5.exesonia_5.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368 -
C:\Users\Admin\Documents\KZvqShJ9r4xiJVc_UVFdJBCR.exe"C:\Users\Admin\Documents\KZvqShJ9r4xiJVc_UVFdJBCR.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1828 -
C:\Users\Admin\Documents\KZvqShJ9r4xiJVc_UVFdJBCR.exe"C:\Users\Admin\Documents\KZvqShJ9r4xiJVc_UVFdJBCR.exe"7⤵PID:2856
-
-
-
C:\Users\Admin\Documents\6Ltht0BzS_gXI3ibSS0IsFLf.exe"C:\Users\Admin\Documents\6Ltht0BzS_gXI3ibSS0IsFLf.exe"6⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\Documents\XN2GoTLmPPzxVHpCFMGc0LPu.exe"C:\Users\Admin\Documents\XN2GoTLmPPzxVHpCFMGc0LPu.exe"6⤵
- Executes dropped EXE
PID:2028
-
-
C:\Users\Admin\Documents\FY8_BpN95wpRcYqnjEcI0dLT.exe"C:\Users\Admin\Documents\FY8_BpN95wpRcYqnjEcI0dLT.exe"6⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"7⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt7⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"7⤵PID:2228
-
-
-
C:\Users\Admin\Documents\LrDJtjZxoUhrCgBPKoA3j1Ve.exe"C:\Users\Admin\Documents\LrDJtjZxoUhrCgBPKoA3j1Ve.exe"6⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\Documents\LrDJtjZxoUhrCgBPKoA3j1Ve.exeC:\Users\Admin\Documents\LrDJtjZxoUhrCgBPKoA3j1Ve.exe7⤵PID:892
-
-
-
C:\Users\Admin\Documents\tT3zRPobCkhQwzkaTalybj9u.exe"C:\Users\Admin\Documents\tT3zRPobCkhQwzkaTalybj9u.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:2668
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:2768
-
-
-
-
C:\Users\Admin\Documents\fWdKz3EuYHJn48bJrSL8nFVb.exe"C:\Users\Admin\Documents\fWdKz3EuYHJn48bJrSL8nFVb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1612 -
C:\Users\Public\run.exeC:\Users\Public\run.exe7⤵PID:2280
-
C:\Users\Public\run.exeC:\Users\Public\run.exe8⤵PID:2768
-
-
-
-
C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"7⤵PID:2976
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"8⤵PID:2900
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"9⤵PID:2448
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2448.0.1587411387\95208403" -parentBuildID 20200403170909 -prefsHandle 1132 -prefMapHandle 1068 -prefsLen 1 -prefMapSize 218938 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2448 "\\.\pipe\gecko-crash-server-pipe.2448" 1216 gpu10⤵PID:2284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2448.3.264911914\465962297" -childID 1 -isForBrowser -prefsHandle 4272 -prefMapHandle 4268 -prefsLen 156 -prefMapSize 218938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2448 "\\.\pipe\gecko-crash-server-pipe.2448" 4284 tab10⤵PID:3580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2448.13.1297685243\734563361" -childID 2 -isForBrowser -prefsHandle 2604 -prefMapHandle 2592 -prefsLen 7588 -prefMapSize 218938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2448 "\\.\pipe\gecko-crash-server-pipe.2448" 3288 tab10⤵PID:1608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2448.20.862995282\1228269900" -childID 3 -isForBrowser -prefsHandle 2388 -prefMapHandle 2356 -prefsLen 8981 -prefMapSize 218938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2448 "\\.\pipe\gecko-crash-server-pipe.2448" 2560 tab10⤵PID:3120
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"8⤵PID:2732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef19e4f50,0x7fef19e4f60,0x7fef19e4f709⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,8747893937291852942,7452543449508468204,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1060 /prefetch:29⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1048,8747893937291852942,7452543449508468204,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1440 /prefetch:89⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1048,8747893937291852942,7452543449508468204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 /prefetch:89⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,8747893937291852942,7452543449508468204,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1820 /prefetch:19⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings9⤵PID:1556
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13fc0a890,0x13fc0a8a0,0x13fc0a8b010⤵PID:1228
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2976 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"8⤵PID:2336
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 29769⤵
- Kills process with taskkill
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 2976 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\EXgOyzYGTmbrN6E1RUlwawJR.exe"8⤵PID:2136
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 29769⤵
- Loads dropped DLL
- Kills process with taskkill
PID:1368
-
-
-
-
-
C:\Users\Admin\Documents\dDBJ8YwgEJDByPJuNMNmre8Q.exe"C:\Users\Admin\Documents\dDBJ8YwgEJDByPJuNMNmre8Q.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2140
-
-
C:\Users\Admin\Documents\p9lbRFUuZxPe4_3PMNzzwxv7.exe"C:\Users\Admin\Documents\p9lbRFUuZxPe4_3PMNzzwxv7.exe"6⤵
- Executes dropped EXE
PID:2248 -
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"7⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"8⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"8⤵PID:2628
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2768⤵
- Program crash
PID:2788
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:3340
-
-
-
-
C:\Users\Admin\Documents\XaS9QUUrhNj21ykaBuCx53yR.exe"C:\Users\Admin\Documents\XaS9QUUrhNj21ykaBuCx53yR.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "XaS9QUUrhNj21ykaBuCx53yR.exe" /f & erase "C:\Users\Admin\Documents\XaS9QUUrhNj21ykaBuCx53yR.exe" & exit7⤵PID:908
-
-
-
C:\Users\Admin\Documents\4OpcfTducy9hrCU6bSiXKPfo.exe"C:\Users\Admin\Documents\4OpcfTducy9hrCU6bSiXKPfo.exe"6⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 9687⤵
- Program crash
PID:1308
-
-
-
C:\Users\Admin\Documents\VHPnnt3DYjtIKlU8mLwO7AHY.exe"C:\Users\Admin\Documents\VHPnnt3DYjtIKlU8mLwO7AHY.exe"6⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\Documents\VHPnnt3DYjtIKlU8mLwO7AHY.exeC:\Users\Admin\Documents\VHPnnt3DYjtIKlU8mLwO7AHY.exe7⤵PID:900
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Loads dropped DLL
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\7zS0530D795\sonia_6.exesonia_6.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:2476
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 4124⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵PID:2984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\4A78.exeC:\Users\Admin\AppData\Local\Temp\4A78.exe1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\8BEC.exeC:\Users\Admin\AppData\Local\Temp\8BEC.exe1⤵PID:3416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 8BEC.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8BEC.exe" & del C:\ProgramData\*.dll & exit2⤵PID:2556
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 8BEC.exe /f3⤵
- Kills process with taskkill
PID:3448
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:1628
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E49F9313-260A-4D92-98A3-4BF1AF38854A} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:1072
-
C:\Users\Admin\AppData\Roaming\vvbuuvfC:\Users\Admin\AppData\Roaming\vvbuuvf2⤵PID:2908
-
C:\Users\Admin\AppData\Roaming\vvbuuvfC:\Users\Admin\AppData\Roaming\vvbuuvf3⤵PID:4056
-
-
-
C:\Users\Admin\AppData\Local\Temp\6B43.exeC:\Users\Admin\AppData\Local\Temp\6B43.exe1⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\A602.exeC:\Users\Admin\AppData\Local\Temp\A602.exe1⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\BFF9.exeC:\Users\Admin\AppData\Local\Temp\BFF9.exe1⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\DB28.exeC:\Users\Admin\AppData\Local\Temp\DB28.exe1⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\EF83.exeC:\Users\Admin\AppData\Local\Temp\EF83.exe1⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\5C89.exeC:\Users\Admin\AppData\Local\Temp\5C89.exe1⤵PID:3164
-
C:\Windows\system32\cmd.execmd /c start c.exe & start l.exe2⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l.exel.exe3⤵PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c.exec.exe3⤵PID:3264
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Parlasse.wmv4⤵PID:388
-
C:\Windows\SysWOW64\cmd.execmd5⤵PID:968
-
-
-
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^hqVLSBiFVkisDvgANWfHkkgqnFPqUPdvHQlUgqiIGEuNwqJAbhcZzXvwMVhhLiKuVLKNjzkNOHwGyBYbVfCGzdrKzoozMTXmTqRddWgreIkLVQWlWPacEtMEHZxtk$" Ove.wmv1⤵PID:2152
-
C:\Windows\SysWOW64\PING.EXEping QWOCTUPM -n 301⤵
- Runs ping.exe
PID:3904
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.comPuramente.exe.com m1⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.com m2⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.com m3⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puramente.exe.com m4⤵PID:852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7DB0.exeC:\Users\Admin\AppData\Local\Temp\7DB0.exe1⤵PID:3016
-
C:\Windows\system32\cmd.execmd /c start c.exe & start l.exe2⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l.exel.exe3⤵PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c.exec.exe3⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Parlasse.wmv4⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd5⤵PID:2240
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^hqVLSBiFVkisDvgANWfHkkgqnFPqUPdvHQlUgqiIGEuNwqJAbhcZzXvwMVhhLiKuVLKNjzkNOHwGyBYbVfCGzdrKzoozMTXmTqRddWgreIkLVQWlWPacEtMEHZxtk$" Ove.wmv6⤵PID:2948
-
-
C:\Windows\SysWOW64\PING.EXEping QWOCTUPM -n 306⤵
- Runs ping.exe
PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Puramente.exe.comPuramente.exe.com m6⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Puramente.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Puramente.exe.com m7⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\RegAsm.exe8⤵PID:2288
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2480
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3380
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3100
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3352
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2812
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3120
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3672
-
C:\Windows\system32\taskeng.exetaskeng.exe {BCA11F77-3BA9-461F-B745-51375D17818C} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:3032
-
C:\Users\Admin\AppData\Roaming\vvbuuvfC:\Users\Admin\AppData\Roaming\vvbuuvf2⤵PID:2928
-
C:\Users\Admin\AppData\Roaming\vvbuuvfC:\Users\Admin\AppData\Roaming\vvbuuvf3⤵PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\BB9B.exeC:\Users\Admin\AppData\Local\Temp\BB9B.exe1⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\DC07.exeC:\Users\Admin\AppData\Local\Temp\DC07.exe1⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im DC07.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\DC07.exe" & del C:\ProgramData\*.dll & exit2⤵PID:4076
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im DC07.exe /f3⤵
- Kills process with taskkill
PID:3336
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:2300
-
-