Resubmissions
03/09/2021, 12:16
210903-pfn3ysdac4 1003/09/2021, 04:55
210903-fj6mqsfbfk 1002/09/2021, 19:23
210902-x37sksbef5 1002/09/2021, 15:02
210902-senycadeck 1002/09/2021, 11:29
210902-4b2x2c3ahj 1002/09/2021, 05:46
210902-lng5vcn31n 1002/09/2021, 04:57
210902-gp7zs88ann 1001/09/2021, 17:32
210901-sgcvvtysvs 1031/08/2021, 12:57
210831-1v8aywj16x 1031/08/2021, 07:34
210831-n7h9w45r3x 10Analysis
-
max time kernel
197s -
max time network
616s -
platform
windows7_x64 -
resource
win7-jp -
submitted
02/09/2021, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
Setup.exe
Resource
win7-en
Behavioral task
behavioral4
Sample
Setup.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
Setup.exe
Resource
win11
Behavioral task
behavioral6
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral7
Sample
Setup.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
Setup.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10-de
General
-
Target
Setup.exe
-
Size
631KB
-
MD5
cb927513ff8ebff4dd52a47f7e42f934
-
SHA1
0de47c02a8adc4940a6c18621b4e4a619641d029
-
SHA256
fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f
-
SHA512
988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c
Malware Config
Extracted
redline
193.56.146.60:16367
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2956 rundll32.exe 70 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/1104-148-0x00000000025D0000-0x00000000025ED000-memory.dmp family_redline behavioral1/memory/1104-166-0x0000000003E00000-0x0000000003E1C000-memory.dmp family_redline behavioral1/memory/2996-201-0x0000000000210000-0x000000000024D000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 22 IoCs
pid Process 1676 r9LUux7eI4Btzvt5cKE8icJS.exe 1104 twpGV5l7AeEoxYVzHcgkAz3I.exe 1172 8c_lxHTPRVOn3newvAwpmLCm.exe 1324 hPuaj6lo2FvcEHGsoE3U9wM4.exe 1484 QOE12Fgh7JKe9ieLhKDSa8Ne.exe 1360 kWrJO_fer5v8QUWNvdiwLuis.exe 1144 bi1JkZBqV93aPNwtaL4XGU1m.exe 1804 iT3BCkGR6xecZ4hPoCQXdJbL.exe 532 d88FCYt8jsbT5USFmEcqgfJL.exe 1356 nwSkdO9RUcFryWKX6cAlajm6.exe 344 o6TGr_8lWfLLrETUnumB0qvs.exe 1684 NSjiVNdIFmtuukfDSenGdz9K.exe 676 YJNYjt4VSQScqdDgLPC1Riip.exe 384 6N7ugqzPJ_JnQE0jdRXd0_io.exe 828 ZQhpdOkfAqba84FZOEerpM3U.exe 1320 TKylJ_OPbbo8EP6gZDHLeLoi.exe 1848 3MxL3OcnRJGs8_kRFeyVFrnH.exe 2012 inst001.exe 1280 6N7ugqzPJ_JnQE0jdRXd0_io.exe 1364 cutm3.exe 1552 P0n8J9Y4aMTBOfal0uEGJ7D2.exe 2020 md8_8eus.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-44314785-1079839627-1077622526-1000\Control Panel\International\Geo\Nation Setup.exe -
Loads dropped DLL 32 IoCs
pid Process 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 2024 Setup.exe 1848 3MxL3OcnRJGs8_kRFeyVFrnH.exe 1320 TKylJ_OPbbo8EP6gZDHLeLoi.exe 1320 TKylJ_OPbbo8EP6gZDHLeLoi.exe 1320 TKylJ_OPbbo8EP6gZDHLeLoi.exe 1320 TKylJ_OPbbo8EP6gZDHLeLoi.exe -
resource yara_rule behavioral1/files/0x0001000000012f1c-58.dat themida behavioral1/files/0x0001000000012f1c-63.dat themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ipinfo.io 109 ip-api.com 136 freegeoip.app 138 freegeoip.app 139 freegeoip.app 141 freegeoip.app 19 ipinfo.io -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\inst001.exe TKylJ_OPbbo8EP6gZDHLeLoi.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe TKylJ_OPbbo8EP6gZDHLeLoi.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe TKylJ_OPbbo8EP6gZDHLeLoi.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe TKylJ_OPbbo8EP6gZDHLeLoi.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini TKylJ_OPbbo8EP6gZDHLeLoi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2848 344 WerFault.exe 48 748 2116 WerFault.exe 80 796 2436 WerFault.exe 74 -
Kills process with taskkill 5 IoCs
pid Process 2504 taskkill.exe 2444 taskkill.exe 552 taskkill.exe 1912 taskkill.exe 2456 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2024 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1104 2024 Setup.exe 32 PID 2024 wrote to memory of 1104 2024 Setup.exe 32 PID 2024 wrote to memory of 1104 2024 Setup.exe 32 PID 2024 wrote to memory of 1104 2024 Setup.exe 32 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1676 2024 Setup.exe 35 PID 2024 wrote to memory of 1172 2024 Setup.exe 34 PID 2024 wrote to memory of 1172 2024 Setup.exe 34 PID 2024 wrote to memory of 1172 2024 Setup.exe 34 PID 2024 wrote to memory of 1172 2024 Setup.exe 34 PID 2024 wrote to memory of 1484 2024 Setup.exe 43 PID 2024 wrote to memory of 1484 2024 Setup.exe 43 PID 2024 wrote to memory of 1484 2024 Setup.exe 43 PID 2024 wrote to memory of 1484 2024 Setup.exe 43 PID 2024 wrote to memory of 1804 2024 Setup.exe 42 PID 2024 wrote to memory of 1804 2024 Setup.exe 42 PID 2024 wrote to memory of 1804 2024 Setup.exe 42 PID 2024 wrote to memory of 1804 2024 Setup.exe 42 PID 2024 wrote to memory of 532 2024 Setup.exe 44 PID 2024 wrote to memory of 532 2024 Setup.exe 44 PID 2024 wrote to memory of 532 2024 Setup.exe 44 PID 2024 wrote to memory of 532 2024 Setup.exe 44 PID 2024 wrote to memory of 1324 2024 Setup.exe 41 PID 2024 wrote to memory of 1324 2024 Setup.exe 41 PID 2024 wrote to memory of 1324 2024 Setup.exe 41 PID 2024 wrote to memory of 1324 2024 Setup.exe 41 PID 2024 wrote to memory of 1144 2024 Setup.exe 40 PID 2024 wrote to memory of 1144 2024 Setup.exe 40 PID 2024 wrote to memory of 1144 2024 Setup.exe 40 PID 2024 wrote to memory of 1144 2024 Setup.exe 40 PID 2024 wrote to memory of 1360 2024 Setup.exe 39 PID 2024 wrote to memory of 1360 2024 Setup.exe 39 PID 2024 wrote to memory of 1360 2024 Setup.exe 39 PID 2024 wrote to memory of 1360 2024 Setup.exe 39 PID 2024 wrote to memory of 1356 2024 Setup.exe 37 PID 2024 wrote to memory of 1356 2024 Setup.exe 37 PID 2024 wrote to memory of 1356 2024 Setup.exe 37 PID 2024 wrote to memory of 1356 2024 Setup.exe 37 PID 2024 wrote to memory of 1768 2024 Setup.exe 38 PID 2024 wrote to memory of 1768 2024 Setup.exe 38 PID 2024 wrote to memory of 1768 2024 Setup.exe 38 PID 2024 wrote to memory of 1768 2024 Setup.exe 38 PID 2024 wrote to memory of 1684 2024 Setup.exe 36 PID 2024 wrote to memory of 1684 2024 Setup.exe 36 PID 2024 wrote to memory of 1684 2024 Setup.exe 36 PID 2024 wrote to memory of 1684 2024 Setup.exe 36 PID 2024 wrote to memory of 1552 2024 Setup.exe 49 PID 2024 wrote to memory of 1552 2024 Setup.exe 49 PID 2024 wrote to memory of 1552 2024 Setup.exe 49 PID 2024 wrote to memory of 1552 2024 Setup.exe 49 PID 2024 wrote to memory of 344 2024 Setup.exe 48 PID 2024 wrote to memory of 344 2024 Setup.exe 48 PID 2024 wrote to memory of 344 2024 Setup.exe 48 PID 2024 wrote to memory of 344 2024 Setup.exe 48 PID 2024 wrote to memory of 384 2024 Setup.exe 47 PID 2024 wrote to memory of 384 2024 Setup.exe 47 PID 2024 wrote to memory of 384 2024 Setup.exe 47 PID 2024 wrote to memory of 384 2024 Setup.exe 47 PID 2024 wrote to memory of 676 2024 Setup.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\Documents\twpGV5l7AeEoxYVzHcgkAz3I.exe"C:\Users\Admin\Documents\twpGV5l7AeEoxYVzHcgkAz3I.exe"2⤵
- Executes dropped EXE
PID:1104
-
-
C:\Users\Admin\Documents\8c_lxHTPRVOn3newvAwpmLCm.exe"C:\Users\Admin\Documents\8c_lxHTPRVOn3newvAwpmLCm.exe"2⤵
- Executes dropped EXE
PID:1172
-
-
C:\Users\Admin\Documents\r9LUux7eI4Btzvt5cKE8icJS.exe"C:\Users\Admin\Documents\r9LUux7eI4Btzvt5cKE8icJS.exe"2⤵
- Executes dropped EXE
PID:1676
-
-
C:\Users\Admin\Documents\NSjiVNdIFmtuukfDSenGdz9K.exe"C:\Users\Admin\Documents\NSjiVNdIFmtuukfDSenGdz9K.exe"2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\Documents\nwSkdO9RUcFryWKX6cAlajm6.exe"C:\Users\Admin\Documents\nwSkdO9RUcFryWKX6cAlajm6.exe"2⤵
- Executes dropped EXE
PID:1356
-
-
C:\Users\Admin\Documents\4Q0dbFa3NFMNsF3Yl5HJcQyd.exe"C:\Users\Admin\Documents\4Q0dbFa3NFMNsF3Yl5HJcQyd.exe"2⤵PID:1768
-
-
C:\Users\Admin\Documents\kWrJO_fer5v8QUWNvdiwLuis.exe"C:\Users\Admin\Documents\kWrJO_fer5v8QUWNvdiwLuis.exe"2⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "kWrJO_fer5v8QUWNvdiwLuis.exe" /f & erase "C:\Users\Admin\Documents\kWrJO_fer5v8QUWNvdiwLuis.exe" & exit3⤵PID:1368
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "kWrJO_fer5v8QUWNvdiwLuis.exe" /f4⤵
- Kills process with taskkill
PID:2504
-
-
-
-
C:\Users\Admin\Documents\bi1JkZBqV93aPNwtaL4XGU1m.exe"C:\Users\Admin\Documents\bi1JkZBqV93aPNwtaL4XGU1m.exe"2⤵
- Executes dropped EXE
PID:1144
-
-
C:\Users\Admin\Documents\hPuaj6lo2FvcEHGsoE3U9wM4.exe"C:\Users\Admin\Documents\hPuaj6lo2FvcEHGsoE3U9wM4.exe"2⤵
- Executes dropped EXE
PID:1324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:2984
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:2128
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2128.0.1946924447\1001551879" -parentBuildID 20200403170909 -prefsHandle 1148 -prefMapHandle 1140 -prefsLen 1 -prefMapSize 218671 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2128 "\\.\pipe\gecko-crash-server-pipe.2128" 1212 gpu5⤵PID:2792
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵PID:3032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=93.0.4577.63 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fee826a380,0x7fee826a390,0x7fee826a3a04⤵PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1324 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\hPuaj6lo2FvcEHGsoE3U9wM4.exe"3⤵PID:2964
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 13244⤵
- Kills process with taskkill
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1324 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\Documents\hPuaj6lo2FvcEHGsoE3U9wM4.exe"3⤵PID:2272
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 13244⤵
- Kills process with taskkill
PID:1912
-
-
-
-
C:\Users\Admin\Documents\iT3BCkGR6xecZ4hPoCQXdJbL.exe"C:\Users\Admin\Documents\iT3BCkGR6xecZ4hPoCQXdJbL.exe"2⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\9953380471.exe"3⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\9953380471.exe"C:\Users\Admin\AppData\Local\Temp\9953380471.exe"4⤵PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "iT3BCkGR6xecZ4hPoCQXdJbL.exe" /f & erase "C:\Users\Admin\Documents\iT3BCkGR6xecZ4hPoCQXdJbL.exe" & exit3⤵PID:2664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "iT3BCkGR6xecZ4hPoCQXdJbL.exe" /f4⤵
- Kills process with taskkill
PID:2444
-
-
-
-
C:\Users\Admin\Documents\QOE12Fgh7JKe9ieLhKDSa8Ne.exe"C:\Users\Admin\Documents\QOE12Fgh7JKe9ieLhKDSa8Ne.exe"2⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "QOE12Fgh7JKe9ieLhKDSa8Ne.exe" /f & erase "C:\Users\Admin\Documents\QOE12Fgh7JKe9ieLhKDSa8Ne.exe" & exit3⤵PID:2132
-
-
-
C:\Users\Admin\Documents\d88FCYt8jsbT5USFmEcqgfJL.exe"C:\Users\Admin\Documents\d88FCYt8jsbT5USFmEcqgfJL.exe"2⤵
- Executes dropped EXE
PID:532
-
-
C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe"C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe"2⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF """" == """" for %N In ( ""C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )3⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "" == "" for %N In ("C:\Users\Admin\Documents\YJNYjt4VSQScqdDgLPC1Riip.exe" ) do taskkill -F /Im "%~nXN"4⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exEKRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG5⤵PID:2892
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBScRipT: CLOSe ( CreATEoBjECT ("wscrIpt.SheLL" ). RUn ( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF ""-pA1IQsAATOS0kxrmeOcrgfdjncUG "" == """" for %N In ( ""C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE"" ) do taskkill -F /Im ""%~nXN"" " , 0, True ) )6⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" > KRkNvH~YgUUt9O.exE && STarT KRKNvH~yGuUT9O.eXE -pA1IQsAATOS0kxrmeOcrgfdjncUG & iF "-pA1IQsAATOS0kxrmeOcrgfdjncUG " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\KRkNvH~YgUUt9O.exE" ) do taskkill -F /Im "%~nXN"7⤵PID:1632
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -F /Im "YJNYjt4VSQScqdDgLPC1Riip.exe"5⤵
- Kills process with taskkill
PID:552
-
-
-
-
-
C:\Users\Admin\Documents\6N7ugqzPJ_JnQE0jdRXd0_io.exe"C:\Users\Admin\Documents\6N7ugqzPJ_JnQE0jdRXd0_io.exe"2⤵
- Executes dropped EXE
PID:384 -
C:\Users\Admin\Documents\6N7ugqzPJ_JnQE0jdRXd0_io.exe"C:\Users\Admin\Documents\6N7ugqzPJ_JnQE0jdRXd0_io.exe" -u3⤵
- Executes dropped EXE
PID:1280
-
-
-
C:\Users\Admin\Documents\o6TGr_8lWfLLrETUnumB0qvs.exe"C:\Users\Admin\Documents\o6TGr_8lWfLLrETUnumB0qvs.exe"2⤵
- Executes dropped EXE
PID:344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 8803⤵
- Program crash
PID:2848
-
-
-
C:\Users\Admin\Documents\P0n8J9Y4aMTBOfal0uEGJ7D2.exe"C:\Users\Admin\Documents\P0n8J9Y4aMTBOfal0uEGJ7D2.exe"2⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Roaming\7906583.exe"C:\Users\Admin\AppData\Roaming\7906583.exe"3⤵PID:2436
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2436 -s 17324⤵
- Program crash
PID:796
-
-
-
C:\Users\Admin\AppData\Roaming\5820732.exe"C:\Users\Admin\AppData\Roaming\5820732.exe"3⤵PID:1996
-
-
C:\Users\Admin\AppData\Roaming\3987212.exe"C:\Users\Admin\AppData\Roaming\3987212.exe"3⤵PID:2996
-
-
C:\Users\Admin\AppData\Roaming\8618814.exe"C:\Users\Admin\AppData\Roaming\8618814.exe"3⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 16924⤵
- Program crash
PID:748
-
-
-
-
C:\Users\Admin\Documents\ZQhpdOkfAqba84FZOEerpM3U.exe"C:\Users\Admin\Documents\ZQhpdOkfAqba84FZOEerpM3U.exe"2⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\Documents\3MxL3OcnRJGs8_kRFeyVFrnH.exe"C:\Users\Admin\Documents\3MxL3OcnRJGs8_kRFeyVFrnH.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\is-I70L4.tmp\3MxL3OcnRJGs8_kRFeyVFrnH.tmp"C:\Users\Admin\AppData\Local\Temp\is-I70L4.tmp\3MxL3OcnRJGs8_kRFeyVFrnH.tmp" /SL5="$101CE,138429,56832,C:\Users\Admin\Documents\3MxL3OcnRJGs8_kRFeyVFrnH.exe"3⤵PID:524
-
-
-
C:\Users\Admin\Documents\TKylJ_OPbbo8EP6gZDHLeLoi.exe"C:\Users\Admin\Documents\TKylJ_OPbbo8EP6gZDHLeLoi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1320 -
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"3⤵
- Executes dropped EXE
PID:2012
-
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"3⤵
- Executes dropped EXE
PID:1364
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
PID:2020
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2200
-