Analysis
-
max time kernel
1075s -
max time network
1594s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 16:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bazaar.abuse.ch/browse/
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
https://bazaar.abuse.ch/browse/
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
https://bazaar.abuse.ch/browse/
Resource
win10v2004-en-20220113
General
-
Target
https://bazaar.abuse.ch/browse/
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Signatures
-
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex WRUtest.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers WRUtest.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WnRecovery\ = "{325C114B-E113-432A-BCA5-64DB00567517}" WRUtest.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WnRecovery WRUtest.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WnRecovery\ = "{325C114B-E113-432A-BCA5-64DB00567517}" WRUtest.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WnRecovery WRUtest.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/2764-75-0x0000000001390000-0x00000000013E6000-memory.dmp family_redline behavioral1/memory/2764-84-0x0000000001390000-0x00000000013E6000-memory.dmp family_redline behavioral1/memory/2764-85-0x0000000001390000-0x00000000013E6000-memory.dmp family_redline -
Registers COM server for autorun 1 TTPs
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2764-75-0x0000000001390000-0x00000000013E6000-memory.dmp net_reactor behavioral1/memory/2764-84-0x0000000001390000-0x00000000013E6000-memory.dmp net_reactor behavioral1/memory/2764-85-0x0000000001390000-0x00000000013E6000-memory.dmp net_reactor -
Downloads MZ/PE file
-
Drops file in Drivers directory 35 IoCs
description ioc Process File created C:\Windows\system32\drivers\kisnetm64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksapi64_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kdhacker64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisknl64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisknl64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetflt.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetm_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksapi64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kusbquery64.sys kinst_168_607.exe File opened for modification C:\Windows\system32\drivers\kavbootc.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kdhacker64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisknl.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisknl64_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisknl_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kavbootc_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kdhacker.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetmxp.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksskrpr.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kavbootc64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kavbootc64_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksapi.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kdhacker64_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetm64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetm64_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kusbquery.sys kinst_168_607.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kavbootc64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kdhacker_ev.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kiscore.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetflt64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kisnetflt64_arm.sys kinst_168_607.exe File created C:\Windows\system32\drivers\kavbootc.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksapi64.sys kinst_168_607.exe File created C:\Windows\system32\drivers\ksapi_ev.sys kinst_168_607.exe -
Executes dropped EXE 64 IoCs
pid Process 2260 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 2308 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 2764 53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf.exe 2248 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe 2208 b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.exe 2432 is-EMLBD.tmp 2992 OverKeys.exe 568 wmfdist.exe 2980 OverKeys.exe 1076 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.exe 1632 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp 544 cdbxpp.exe 2300 iujefwu 2876 uijefwu 1624 uijefwu 3012 OverKeys.exe 2508 wmfdist.exe 1120 unins000.exe 2488 _iu14D2N.tmp 2300 736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe 1644 736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2260 MiniInpaint_sdcn.70744.exe 3012 MiniInpaint_sdcn.70744.exe 956 MiniInpaintservices.exe 2016 MiniInpaint.exe 1592 RedrabCut-1226.exe 2460 s1ca50uaa0157n2lg0h2t.exe 1724 setup_wnhfdskb006.exe 2624 WRUtest.exe 2972 Setup_App_notebook1002.exe 2940 FZip_V70010.exe 2168 setup_wnhfdskb006.exe 1536 Setup_App_notebook1002.exe 2392 WRUtest.exe 2664 TxtSetup.exe 2932 RedrabCutB.exe 2728 RedrabCutT.exe 1508 RedrabCutDesk.exe 888 RedrabCut.exe 2480 FZipService.exe 2288 FZip.exe 2892 FZipService.exe 1712 MiniInpaint.exe 3064 scater.exe 1612 WRSvn.exe 2176 WRUtest.exe 2412 WRUpade.exe 2900 kis.exe 2396 EasyBk_sdcn.6200.exe 2608 EasyBksvc.exe 2516 QuanNotePad.exe 2340 kinst_168_607.exe 2660 FZip.exe 2228 installer_19.11.1.exe 3080 dsgter_v9.0.1.exe 3140 SuiXinDaemon.exe 3160 SuiXinDaemon.exe 3304 redater.exe 3332 RedrabCutB.exe 3404 heinote_4096036864_baizhan_001.exe 3580 hnote.exe 3572 hnote.exe -
Modifies Windows Firewall 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Loads dropped DLL 64 IoCs
pid Process 2208 b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.exe 2432 is-EMLBD.tmp 2432 is-EMLBD.tmp 2432 is-EMLBD.tmp 2432 is-EMLBD.tmp 2432 is-EMLBD.tmp 1076 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.exe 1632 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp 1632 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp 564 regsvr32.exe 564 regsvr32.exe 564 regsvr32.exe 2164 regsvr32.exe 2164 regsvr32.exe 2164 regsvr32.exe 1632 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 544 cdbxpp.exe 1120 unins000.exe 2488 _iu14D2N.tmp 2488 _iu14D2N.tmp 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 1684 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2176 ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe 2260 MiniInpaint_sdcn.70744.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\MiniInpaintNP = "\"C:\\Users\\Admin\\AppData\\Roaming\\MiniInpaint\\MiniInpaint.exe\" --uprun" MiniInpaint_sdcn.70744.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\EasyBkReg = "\"C:\\Users\\Admin\\AppData\\Roaming\\EasyBk\\EasyBk.exe\" --spustart" EasyBk_sdcn.6200.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RedrabCut-1226.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA kinst_168_607.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RedrabCutB.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini xiaoheiminixhtt.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini xiaoheiminixhtt.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini xiaoheiminixhtt.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini xiaoheiminixhtt.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini xiaoheiminixhtt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: cdbxpp.exe File opened (read-only) \??\F: cdbxpp.exe File opened (read-only) \??\K: cdbxpp.exe File opened (read-only) \??\U: cdbxpp.exe File opened (read-only) \??\X: cdbxpp.exe File opened (read-only) \??\T: cdbxpp.exe File opened (read-only) \??\V: cdbxpp.exe File opened (read-only) \??\E: cdbxpp.exe File opened (read-only) \??\H: cdbxpp.exe File opened (read-only) \??\I: cdbxpp.exe File opened (read-only) \??\L: cdbxpp.exe File opened (read-only) \??\M: cdbxpp.exe File opened (read-only) \??\S: cdbxpp.exe File opened (read-only) \??\B: cdbxpp.exe File opened (read-only) \??\J: cdbxpp.exe File opened (read-only) \??\O: cdbxpp.exe File opened (read-only) \??\W: cdbxpp.exe File opened (read-only) \??\Z: cdbxpp.exe File opened (read-only) \??\G: cdbxpp.exe File opened (read-only) \??\N: cdbxpp.exe File opened (read-only) \??\P: cdbxpp.exe File opened (read-only) \??\Q: cdbxpp.exe File opened (read-only) \??\R: cdbxpp.exe File opened (read-only) \??\Y: cdbxpp.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\allocatecdroms = "0" 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp -
Writes to the Master Boot Record (MBR) 1 TTPs 64 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 siuywteinbg.exe File opened for modification \??\PhysicalDrive0 xiaoheiminixhtt.exe File opened for modification \??\PhysicalDrive0 scater.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 regsvr32.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 Jsbyptp.exe File opened for modification \??\PhysicalDrive0 dsgter_v9.0.1.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 heipan.exe File opened for modification \??\PhysicalDrive0 xiaoheitipsxhtt.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 redater.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 heipan.exe File opened for modification \??\PhysicalDrive0 xiaoheitipsrytx.exe File opened for modification \??\PhysicalDrive0 Setup_App_notebook1002.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 abckantu_2722097895_shouheng_001.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 xiaoheiminixhtt.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 Jsbyptp.exe File opened for modification \??\PhysicalDrive0 xiaoheiminixhtt.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 Jsbyptp.exe File opened for modification \??\PhysicalDrive0 heipan.exe File opened for modification \??\PhysicalDrive0 pbxhone.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 pbxhone.exe File opened for modification \??\PhysicalDrive0 hnote.exe File opened for modification \??\PhysicalDrive0 xiaoheitipsxhtt.exe File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 Update.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 open.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 regsvr32.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 notepaper.exe File opened for modification \??\PhysicalDrive0 xiaoheitipsxhtt.exe File opened for modification \??\PhysicalDrive0 feedback.exe File opened for modification \??\PhysicalDrive0 Jsbyptp.exe File opened for modification \??\PhysicalDrive0 Process not Found File opened for modification \??\PhysicalDrive0 skinbox.exe File opened for modification \??\PhysicalDrive0 Jsbyptp.exe File opened for modification \??\PhysicalDrive0 xiaoheiminixhtt.exe File opened for modification \??\PhysicalDrive0 xiaoheiminixhtt.exe File opened for modification \??\PhysicalDrive0 readmode.exe File opened for modification \??\PhysicalDrive0 Process not Found File opened for modification \??\PhysicalDrive0 skinbox.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\a60ab04dbcf89270b14e41fb4d9d922b[1].cba svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2D993E9BDDFC2D49E19866F11A7E662_9926F351FE8BA47A31CFC9014DCAA2ED svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\sht[1].aea svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2D993E9BDDFC2D49E19866F11A7E662_9926F351FE8BA47A31CFC9014DCAA2ED svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2764 53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2260 set thread context of 2308 2260 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 44 PID 2876 set thread context of 1624 2876 uijefwu 81 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\CDBurnerXP\fi-FI\is-9GU4A.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created C:\Program Files (x86)\CDBurnerXP\ru-RU\is-2QCNU.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\spt\u6h7b1s4e9z0z0m1x2.lat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksg\ztfd5002.fsg kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\api-ms-win-crt-private-l1-1-0.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\haohuojingxuan-taobao.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kstools.dll kinst_168_607.exe File created C:\Program Files (x86)\CDBurnerXP\is-2869P.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\tianshizhiyi_skin_img.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\vinfo.ini kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\delaydownloader.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\k2s3rdhmpg32.dll.bak kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\trash_scan.png kinst_168_607.exe File opened for modification C:\Program Files (x86)\WnRecovery\WRUpade.exe setup_wnhfdskb006.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kscanner.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_normal_taobao1212_test1_main.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsu.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\spt\q2o0b1f5t6m1i5r8k3.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksg\btfb7001.fsg kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\clearplugin\plugin.nlb kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kteenmodecore.dll kinst_168_607.exe File created C:\Program Files (x86)\Over Keys\is-FFNUA.tmp is-EMLBD.tmp File created C:\Program Files (x86)\CDBurnerXP\Resources\is-415EP.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\bredirect.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\decswitch.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\api-ms-win-core-xstate-l2-1-0.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\keasyipcnmt.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kdhacker64.sys kinst_168_607.exe File created C:\Program Files (x86)\WnRecovery\WRmn.exe setup_wnhfdskb006.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\pps_rcmd_mainicon.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kcdpt\selfdetect.ini kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\knotifycenter.exe kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kdnsresolver.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\xianshifengqiang-taobao.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\litecommoncfg.ini kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\api-ms-win-core-libraryloader-l1-1-0.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\plugins\imageformats\qtga.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoft.xml kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\deexswitch.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksg\befc2009.psg kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\api-ms-win-crt-process-l1-1-0.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\knetctrl.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ks3rdhmpg64.dll kinst_168_607.exe File created C:\Program Files (x86)\CDBurnerXP\is-R3OE2.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kvipapp_recommand_priority.ini kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\netbank.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksg\ztfe8001.fsg kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\skin\theme\ocean.dubatheme kinst_168_607.exe File created C:\Program Files (x86)\CDBurnerXP\sk-SK\is-4BDKA.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created C:\Program Files (x86)\FZip\3.11.26.1\FZipService.exe FZip_V70010.exe File created C:\Program Files (x86)\FZip\3.11.26.1\FZipTalnc.exe FZip_V70010.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\img_data_revert.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\pps_rcmd_subicon.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_tianmao_icon0415.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kbootfilter.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore_sp.xcf kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktrashautoclean.exe kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\msvcp140_2.dll kinst_168_607.exe File created C:\Program Files (x86)\CDBurnerXP\is-A1ASP.tmp 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_software_analyze.png kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\crw.dat kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksg\ztvba012.vsg kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\api-ms-win-crt-multibyte-l1-1-0.dll kinst_168_607.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\bc.dat kinst_168_607.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe Process not Found File created C:\Windows\Tasks\MiniInpaint update.job MiniInpaint_sdcn.70744.exe File created C:\Windows\Tasks\EasyBk update.job EasyBk_sdcn.6200.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iujefwu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iujefwu Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iujefwu Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1580 schtasks.exe 2500 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM Jsbyptp.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\siuywteinbg.exe = "1" siuywteinbg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT siuywteinbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\xiaoheitipsrytx.exe = "1" xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\Jsbyptp.exe = "1" Jsbyptp.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\xiaoheitipsxhtt.exe = "1" xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING pbxhone.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\xiaoheitipsrytx.exe = "1" xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION siuywteinbg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT pbxhone.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main xiaoheiminixhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\xiaoheitipsxhtt.exe = "1" xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION xiaoheiminixhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\xiaoheitipsrytx.exe = "1" xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main RedrabCutB.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\xiaoheitipsrytx.exe = "0" xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DOMStorage\news.7654.com\ = "63" xiaoheiminixhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL pbxhone.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET pbxhone.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DOMStorage\7654.com\Total = "63" xiaoheiminixhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\siuywteinbg.exe = "0" siuywteinbg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\pbxhone.exe = "1" pbxhone.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\Jsbyptp.exe = "0" Jsbyptp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\xiaoheitipsxhtt.exe = "0" xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING Jsbyptp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\xiaoheiminixhtt.exe = "11000" xiaoheiminixhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\xiaoheitipsrytx.exe = "0" xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\xiaoheitipsxhtt.exe = "0" xiaoheitipsxhtt.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION xiaoheiminixhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\Jsbyptp.exe = "1" Jsbyptp.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION Jsbyptp.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Jsbyptp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\xiaoheitipsxhtt.exe = "1" xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\xiaoheitipsxhtt.exe = "0" xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI xiaoheitipsrytx.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI\xiaoheitipsrytx.exe = "0" xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT xiaoheitipsrytx.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING siuywteinbg.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM pbxhone.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\xiaoheitipsxhtt.exe = "1" xiaoheitipsxhtt.exe Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0192e6e3315d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\xiaoheitipsxhtt.exe = "0" xiaoheitipsxhtt.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\pbxhone.exe = "1" pbxhone.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\pbxhone.exe = "1" pbxhone.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Internet Explorer\DOMStorage xiaoheiminixhtt.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3} svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-c2-fd-42-44-d9 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\2e-c2-fd-42-44-d9 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\WnRecovery WRUtest.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2e-c2-fd-42-44-d9\WpadDecisionTime = 3037269b3315d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\software\Heinote\report svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\software svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Heinote\Install\ svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{31201F96-3F15-42FD-8F85-CD17C503CAB3}\WpadDecisionTime = 3037269b3315d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\software\Heinote\report svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Heinote svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\WnRecovery\WRAppInfo\CfgPath = "C:\\Users\\Admin\\AppData\\LocalLow\\WnRecovery\\" WRUtest.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Heinote\Install\fix = "1643476553" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.iss\shell\open\command hnote.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\5 = c6003100000000003d54208910003034423744457e310000ae0008000400efbe3d5420893d5420892a0000003b1f010000001d0000000000000000000000000000003000340062003700640065003200620061006400320039006600390037003800660032003300380036003400300030006400650063003300300039006600610036003900610033006400640066006200650064003000340032003700380064003100620039003600640036006600350066006200390066006500370037006100000018000000 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CDBurnerXPOpen\shell\open 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7D20766D-2712-4049-9F9A-9131116DE218}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C3CBD658-4406-43D0-ACE3-EFC01AEDF63F}\TypeLib\ = "{93CBA48A-1C58-4648-B22D-8F3588CB8D95}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.yaml\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\Heinote\\hnote.exe,0" hnote.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16741A21-280D-481A-BC57-F05E82C2A0F9}\VersionIndependentProgID regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 0100000000000000ffffffff Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7169A231-64EC-4702-98AB-05ABB6D882A9}\InprocServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.md\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\Heinote\\hnote.exe %1" hnote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4B9FAB2D-BFD6-41AB-AC98-C9A3F0960277}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\StarBurnX.DataFolder.15\ = "DataFolder Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2ED6A7D-B760-44FF-A030-2F5A3A0F0CB1}\TypeLib\ = "{93CBA48A-1C58-4648-B22D-8F3588CB8D95}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C96DD911-8CB1-49F2-A1E6-4721EEEB293E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C3CBD658-4406-43D0-ACE3-EFC01AEDF63F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FAF7CC2-0139-40B9-8AE1-7BC0624E5AD4}\InprocServer32\ = "C:\\Program Files (x86)\\CDBurnerXP\\StarBurnX15.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{67514522-9DB0-4DB4-8DDA-6CCCF6C5B0B1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C4C2FF99-86BD-4343-9582-4C36EF34B186}\TypeLib\ = "{93CBA48A-1C58-4648-B22D-8F3588CB8D95}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5743AE6D-28DB-4889-B4F1-F41256E8C559}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.ntfs\shell FZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.jar\shellex FZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{64EE89E4-01AD-4865-8B40-E80CDDF2783B}\TypeLib\Version = "f.7" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57E67F94-459B-4D9A-9D2B-7738506FD233}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C96DD911-8CB1-49F2-A1E6-4721EEEB293E}\ = "IVideoCdBurner" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rar FZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.001\shellex\PropertySheetHandlers FZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{996C8DFD-8CE6-43B2-9414-CB6132485363}\InprocServer32\ = "C:\\Program Files (x86)\\CDBurnerXP\\StarBurnX15.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C96DD911-8CB1-49F2-A1E6-4721EEEB293E}\ = "IVideoCdBurner" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.yaml\shell hnote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7169A231-64EC-4702-98AB-05ABB6D882A9}\InprocServer32\ = "C:\\Program Files (x86)\\CDBurnerXP\\StarBurnX15.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B756C224-A1EA-44F8-95C1-9F726040C800}\ProgID\ = "StarBurnX.StarBurnX.15" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D80B3FEB-A2A1-484F-85C6-24526CFBC70C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{54968228-12CC-4BB6-993F-5DF90FB8CE24}\TypeLib\Version = "f.7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE860CE7-C15E-4B9C-BA5B-2EB38369E4AF}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lzma FZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.makefile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\Heinote\\hnote.exe %1" hnote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\StarBurnX12.DLL\AppID = "{3DD7EA49-B5E1-4493-895D-C73562138FC0}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C3CBD658-4406-43D0-ACE3-EFC01AEDF63F}\Version\ = "15.7" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{209D6FDF-69B9-4E4E-8545-C0304E72B86F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.z\shellex\PropertySheetHandlers\{D4EB7F10-2C42-48D2-A92A-A5AF68A62909} FZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{68E2A88C-EB6B-42BE-8979-9789B573CD1C}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4019D36C-8251-4C2E-A287-CFAF19C2B548}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dmg FZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CDBurnerXPAudio\DefaultIcon\ = "C:\\Program Files (x86)\\CDBurnerXP\\audio.ico" 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5743AE6D-28DB-4889-B4F1-F41256E8C559} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4EE12AA6-A781-490F-96DA-783969C58A1A}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE9B465F-0405-41B9-8C20-B6F0CACCC713}\ = "DiscInfo Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.bzip2\shell\open\command FZip.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.sql\shell\open\command hnote.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE860CE7-C15E-4B9C-BA5B-2EB38369E4AF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{68E2A88C-EB6B-42BE-8979-9789B573CD1C}\ = "UDFDataBurner Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC675E89-B5BA-4E98-AF11-6A6CDE0C91A8}\ = "IAudioBurner" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4B9FAB2D-BFD6-41AB-AC98-C9A3F0960277}\TypeLib regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{16741A21-280D-481A-BC57-F05E82C2A0F9}\ProgID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\13 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FZip.7z\shellex\DropHandler\ = "{D4EB7F10-2C42-48D2-A92A-A5AF68A62909}" FZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8972B06B-3F0E-42B3-8F2F-1BE2CC64E751}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\{00021500-0000-0000-C000-000000000046}\ = "{F02B30F0-7D50-4437-85E1-55B599290C71}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7169A231-64EC-4702-98AB-05ABB6D882A9}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{86768E57-3BA7-4E97-856C-8189BF3BD05E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{68E2A88C-EB6B-42BE-8979-9789B573CD1C}\ProgID regsvr32.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2840 Reg.exe -
NTFS ADS 11 IoCs
description ioc Process File created C:\Users\Admin\Downloads\b73a2425bfc00e3923e6ca59848a398459f31f5377602d41767dfdbb93568518.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\Unable to open C:\Users\Admin\AppData\Local\Temp\setup_wnhfdskb006.exe ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe File created C:\Users\Admin\Downloads\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\Unable to open C:\Users\Admin\AppData\Local\Temp\s1ca50uaa0157n2lg0h2t.exe ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe File created C:\Users\Admin\Downloads\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8.zip:Zone.Identifier firefox.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2344 regedit.exe 3636 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 2308 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 1400 Process not Found 2256 taskmgr.exe 2604 taskmgr.exe 2660 FZip.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2308 386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe 2248 80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 2300 iujefwu -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1520 firefox.exe Token: SeDebugPrivilege 1520 firefox.exe Token: SeDebugPrivilege 1520 firefox.exe Token: SeRestorePrivilege 2764 7zG.exe Token: 35 2764 7zG.exe Token: SeSecurityPrivilege 2764 7zG.exe Token: SeSecurityPrivilege 2764 7zG.exe Token: SeDebugPrivilege 1520 firefox.exe Token: SeRestorePrivilege 3060 7zG.exe Token: 35 3060 7zG.exe Token: SeSecurityPrivilege 3060 7zG.exe Token: SeSecurityPrivilege 3060 7zG.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeDebugPrivilege 1520 firefox.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeRestorePrivilege 2660 7zG.exe Token: 35 2660 7zG.exe Token: SeSecurityPrivilege 2660 7zG.exe Token: SeSecurityPrivilege 2660 7zG.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeSecurityPrivilege 1400 Process not Found Token: SeTakeOwnershipPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeDebugPrivilege 1520 firefox.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeRestorePrivilege 2428 7zG.exe Token: 35 2428 7zG.exe Token: SeSecurityPrivilege 2428 7zG.exe Token: SeSecurityPrivilege 2428 7zG.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeDebugPrivilege 2256 taskmgr.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeSecurityPrivilege 2256 taskmgr.exe Token: SeTakeOwnershipPrivilege 2256 taskmgr.exe Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeShutdownPrivilege 1400 Process not Found Token: SeDebugPrivilege 1520 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 2764 7zG.exe 3060 7zG.exe 2660 7zG.exe 2428 7zG.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2064 7zG.exe 2300 7zG.exe 1632 04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp 1400 Process not Found 1400 Process not Found 544 cdbxpp.exe 1520 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 2256 taskmgr.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 2616 iexplore.exe 2616 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 1520 firefox.exe 1520 firefox.exe 1520 firefox.exe 1400 Process not Found 1400 Process not Found 1592 RedrabCut-1226.exe 1592 RedrabCut-1226.exe 1592 RedrabCut-1226.exe 2932 RedrabCutB.exe -
Suspicious use of UnmapMainImage 18 IoCs
pid Process 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found 1400 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1752 wrote to memory of 1520 1752 firefox.exe 27 PID 1520 wrote to memory of 968 1520 firefox.exe 29 PID 1520 wrote to memory of 968 1520 firefox.exe 29 PID 1520 wrote to memory of 968 1520 firefox.exe 29 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 1452 1520 firefox.exe 30 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 PID 1520 wrote to memory of 728 1520 firefox.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://bazaar.abuse.ch/browse/1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://bazaar.abuse.ch/browse/2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.0.585969488\1408023247" -parentBuildID 20200403170909 -prefsHandle 1184 -prefMapHandle 1176 -prefsLen 1 -prefMapSize 219537 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 1248 gpu3⤵PID:968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.3.1189629329\1652709078" -childID 1 -isForBrowser -prefsHandle 1640 -prefMapHandle 1636 -prefsLen 156 -prefMapSize 219537 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 1832 tab3⤵PID:1452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.13.1844870330\1933627924" -childID 2 -isForBrowser -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 1022 -prefMapSize 219537 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 2388 tab3⤵PID:728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.20.2076124884\1939688867" -childID 3 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 7013 -prefMapSize 219537 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 2808 tab3⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.27.1468299752\1497283518" -childID 4 -isForBrowser -prefsHandle 3632 -prefMapHandle 3388 -prefsLen 10724 -prefMapSize 219537 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 2476 tab3⤵PID:1904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1520.34.998011381\2000746719" -parentBuildID 20200403170909 -prefsHandle 2464 -prefMapHandle 1604 -prefsLen 10804 -prefMapSize 219537 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1520 "\\.\pipe\gecko-crash-server-pipe.1520" 3220 gpu3⤵PID:2052
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\b73a2425bfc00e3923e6ca59848a398459f31f5377602d41767dfdbb93568518\" -spe -an -ai#7zMap30127:190:7zEvent112011⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2764
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c\" -spe -an -ai#7zMap14849:190:7zEvent143351⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3060
-
C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe"C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2260 -
C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe"C:\Users\Admin\Downloads\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c\386f018af9a7c633ddc450e75491b978ebf22199bf789926b44c62ed0c7ecb6c.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2308
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf\" -spe -an -ai#7zMap11671:190:7zEvent252181⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2660
-
C:\Users\Admin\Downloads\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf.exe"C:\Users\Admin\Downloads\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf\53b60511d295d3bd9c9524f275a4962d8e1cad17ee84d0676ef16bdae07d26bf.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2764
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43\" -spe -an -ai#7zMap20644:190:7zEvent231701⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2428
-
C:\Users\Admin\Downloads\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe"C:\Users\Admin\Downloads\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43\80b2d9c63eacfea597bfd6ec329d69fd8df2e8dbeae18a8f1ac114114ed41d43.exe"1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2248
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2256
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2096
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2340
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b\" -spe -an -ai#7zMap17879:190:7zEvent81441⤵
- Suspicious use of FindShellTrayWindow
PID:2064
-
C:\Users\Admin\Downloads\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.exe"C:\Users\Admin\Downloads\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\is-P0CO8.tmp\is-EMLBD.tmp"C:\Users\Admin\AppData\Local\Temp\is-P0CO8.tmp\is-EMLBD.tmp" /SL4 $B0344 "C:\Users\Admin\Downloads\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b\b52cc8249aefb8dd8e904bdf460f19afd151bde60bad355f436180343a9d153b.exe" 8020379 3363842⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2432 -
C:\Program Files (x86)\Over Keys\OverKeys.exe"C:\Program Files (x86)\Over Keys\OverKeys.exe"3⤵
- Executes dropped EXE
PID:2992
-
-
C:\Program Files (x86)\Over Keys\wmfdist.exe"C:\Program Files (x86)\Over Keys\wmfdist.exe" /Q:A /R:N3⤵
- Executes dropped EXE
PID:568
-
-
C:\Program Files (x86)\Over Keys\OverKeys.exe"C:\Program Files (x86)\Over Keys\OverKeys.exe" c3052713b5b1150f6fea550fa7b745e43⤵
- Executes dropped EXE
PID:2980
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a\" -spe -an -ai#7zMap31559:190:7zEvent321471⤵
- Suspicious use of FindShellTrayWindow
PID:2300
-
C:\Users\Admin\Downloads\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.exe"C:\Users\Admin\Downloads\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\is-2KQ90.tmp\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp"C:\Users\Admin\AppData\Local\Temp\is-2KQ90.tmp\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.tmp" /SL5="$60470,4712769,504320,C:\Users\Admin\Downloads\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a\04b7de2bad29f978f2386400dec309fa69a3ddfbed04278d1b96d6f5fb9fe77a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1632 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\CDBurnerXP\StarBurnX15.dll"3⤵
- Loads dropped DLL
- Modifies registry class
PID:564
-
-
C:\Windows\SysWOW64\Reg.exe"Reg.exe" Copy HKCU\SOFTWARE\CDBurnerXP "HKCU\SOFTWARE\Canneverbe Limited\CDBurnerXP" /s /f3⤵PID:1644
-
-
C:\Windows\SysWOW64\Reg.exe"Reg.exe" Delete HKCU\SOFTWARE\CDBurnerXP /f3⤵
- Modifies registry key
PID:2840
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\CDBurnerXP\StarBurnX15.dll"3⤵
- Loads dropped DLL
- Modifies registry class
PID:2164
-
-
C:\Program Files (x86)\CDBurnerXP\cdbxpp.exe"C:\Program Files (x86)\CDBurnerXP\cdbxpp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:544
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {71E512C0-4808-45E7-A266-0DDF5BC0B689} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵PID:1468
-
C:\Users\Admin\AppData\Roaming\uijefwuC:\Users\Admin\AppData\Roaming\uijefwu2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Users\Admin\AppData\Roaming\uijefwuC:\Users\Admin\AppData\Roaming\uijefwu3⤵
- Executes dropped EXE
PID:1624
-
-
-
C:\Users\Admin\AppData\Roaming\iujefwuC:\Users\Admin\AppData\Roaming\iujefwu2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2300
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:2992
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\Over Keys\IssSurvey.ini1⤵PID:2424
-
C:\Program Files (x86)\Over Keys\OverKeys.exe"C:\Program Files (x86)\Over Keys\OverKeys.exe"1⤵
- Executes dropped EXE
PID:3012
-
C:\Program Files (x86)\Over Keys\wmfdist.exe"C:\Program Files (x86)\Over Keys\wmfdist.exe"1⤵
- Executes dropped EXE
PID:2508
-
C:\Program Files (x86)\Over Keys\unins000.exe"C:\Program Files (x86)\Over Keys\unins000.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Program Files (x86)\Over Keys\unins000.exe" /FIRSTPHASEWND=$702282⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45\" -spe -an -ai#7zMap709:190:7zEvent26771⤵PID:1784
-
C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe"C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe"1⤵
- Executes dropped EXE
PID:2300
-
C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe"C:\Users\Admin\Downloads\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45\736e6a96ccdff0e9f90c8a7dcbd759722384e6eb41f963033075d36923654d45.exe"1⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fudyljy4.cmdline"2⤵PID:2316
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES42AC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC42AB.tmp"3⤵PID:2172
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kc4mlvgk.cmdline"2⤵PID:2352
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES44AF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC44AE.tmp"3⤵PID:1684
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_medium=supportlink&utm_content=aerdialogbox&utm_campaign=smartassembly2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fo7vrvce.cmdline"2⤵PID:2960
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES650B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC650A.tmp"3⤵PID:2188
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9v6t7_ea.cmdline"2⤵PID:1084
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6614.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6613.tmp"3⤵PID:2176
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\" -spe -an -ai#7zMap1955:190:7zEvent59131⤵PID:2816
-
C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe"C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\MiniInpaint_sdcn.70744.exe"C:\Users\Admin\AppData\Local\Temp\MiniInpaint_sdcn.70744.exe"2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\s1ca50uaa0157n2lg0h2t.exe"C:\Users\Admin\AppData\Local\Temp\s1ca50uaa0157n2lg0h2t.exe"2⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\SunnyDay\sunnydayupdate.dll3⤵PID:1652
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\SunnyDay\sunnydayupdate.dll3⤵PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_wnhfdskb006.exe"C:\Users\Admin\AppData\Local\Temp\setup_wnhfdskb006.exe" 8132⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1724 -
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" b09 --20f7=wnhfdskb0062201293⤵
- Modifies system executable filetype association
- Executes dropped EXE
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup_App_notebook1002.exe"C:\Users\Admin\AppData\Local\Temp\Setup_App_notebook1002.exe" /QNC=52EZG8Y3MN2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\ead76b65cc2df78827a117657a2e479a\TxtSetup.exeC:\Users\Admin\AppData\Local\Temp\ead76b65cc2df78827a117657a2e479a\TxtSetup.exe /S /D=C:\Program Files (x86)\QuanTxtReader3⤵
- Executes dropped EXE
PID:2664
-
-
C:\Program Files (x86)\QuanTxtReader\scater.exe"C:\Program Files (x86)\QuanTxtReader\scater.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc ONLOGON /tn redaterTask /RL HIGHEST /tr "C:\Users\Admin\AppData\Local\dsgter\redater.exe"4⤵PID:2312
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn redaterTask /RL HIGHEST /tr "C:\Users\Admin\AppData\Local\dsgter\redater.exe"5⤵
- Creates scheduled task(s)
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\~ead76b65cc2df78827a117657a2e479a\dsgter_v9.0.1.exeC:\Users\Admin\AppData\Local\Temp\~ead76b65cc2df78827a117657a2e479a/dsgter_v9.0.1.exe /DSCHANNEL=9XSWD02NYA4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3080 -
C:\Users\Admin\AppData\Local\dsgter\redater.exeC:\Users\Admin\AppData\Local\dsgter\redater.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\installer_19.11.1.exe"C:\Users\Admin\AppData\Local\Temp\installer_19.11.1.exe" @/s/pid=sx13/cls=02⤵
- Executes dropped EXE
PID:2228 -
C:\Program Files (x86)\SuiXinNote\SuiXinDaemon.exe"C:\Program Files (x86)\SuiXinNote\SuiXinDaemon.exe" /type=install3⤵
- Executes dropped EXE
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\heinote_4096036864_baizhan_001.exeC:\Users\Admin\AppData\Local\Temp\heinote_4096036864_baizhan_001.exe2⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll3⤵PID:3484
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll3⤵PID:3496
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\hnchecker.dll3⤵PID:3508
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg3⤵PID:3548
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll3⤵PID:3588
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll4⤵PID:3624
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -schedule3⤵
- Executes dropped EXE
PID:3580
-
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -install3⤵
- Executes dropped EXE
- Modifies registry class
PID:3572 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg"4⤵
- Runs .reg file with regedit
PID:3636
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll3⤵PID:3644
-
-
C:\Users\Admin\AppData\Roaming\Heinote\updateservice.exe"C:\Users\Admin\AppData\Roaming\Heinote\updateservice.exe" -install3⤵PID:3716
-
-
C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe"C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe" -install3⤵PID:3724
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"3⤵
- Writes to the Master Boot Record (MBR)
PID:3936
-
-
-
C:\Users\Admin\AppData\Local\Temp\abckantu_2722097895_shouheng_001.exeC:\Users\Admin\AppData\Local\Temp\abckantu_2722097895_shouheng_001.exe2⤵
- Writes to the Master Boot Record (MBR)
PID:3372 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\ShellExt64.dll3⤵PID:3556
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\" -spe -an -ai#7zMap12261:320:7zEvent210491⤵PID:2304
-
C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe"C:\Users\Admin\Downloads\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03\ddd9fb480e8170ed8e824026ff227d28a293abf24fa51a27bd5662b585931e03.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\MiniInpaint_sdcn.70744.exe"C:\Users\Admin\AppData\Local\Temp\MiniInpaint_sdcn.70744.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:2260 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="MiniInpaint" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaint.exe" enable=yes3⤵PID:1040
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="MiniInpaintservices" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaintservices.exe" enable=yes3⤵PID:736
-
-
C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaintservices.exe"C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaintservices.exe" -install3⤵
- Executes dropped EXE
PID:956
-
-
C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaint.exe"C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaint.exe" --defrun3⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaint.exe"C:\Users\Admin\AppData\Roaming\MiniInpaint\MiniInpaint.exe" --dqtart4⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Roaming\MiniInpaint\kis.exe"C:\Users\Admin\AppData\Roaming\MiniInpaint\kis.exe" /Q5⤵
- Executes dropped EXE
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\EasyBk_sdcn.6200.exe"C:\Users\Admin\AppData\Local\Temp\EasyBk_sdcn.6200.exe" /Q5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:2396 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="EasyBk" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EasyBk\EasyBk.exe" enable=yes6⤵PID:2516
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="EasyBksvc.exe" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EasyBk\EasyBksvc.exe" enable=yes6⤵PID:1724
-
-
C:\Users\Admin\AppData\Roaming\EasyBk\EasyBksvc.exe"C:\Users\Admin\AppData\Roaming\EasyBk\EasyBksvc.exe" -install6⤵
- Executes dropped EXE
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\kinst_168_607.exe"C:\Users\Admin\AppData\Local\Temp\kinst_168_607.exe" /Q5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:2340 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install6⤵PID:3596
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe" -preload6⤵PID:3652
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs36⤵PID:932
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore6⤵PID:3500
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd6⤵PID:2992
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:3400
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:1040
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:3744
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:2076
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:3924
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:2948
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\knewvip.exe"knewvip.exe" --open_opction=1 --from=1 --start7⤵PID:1972
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kismain.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kismain.exe" /vip:webkit --open_opction=1 --from=1 --start8⤵PID:4080
-
C:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /kismain /vip:webkit --open_opction=1 --from=1 --start9⤵PID:2820
-
-
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:1380
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:4092
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:1868
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:908
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:2480
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:2264
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)7⤵PID:4300
-
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxecenter.exe"7⤵PID:3244
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RedrabCut-1226.exe"C:\Users\Admin\AppData\Local\Temp\RedrabCut-1226.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Program Files (x86)\RedrabCut\RedrabCutB.exe"C:\Program Files (x86)\RedrabCut\RedrabCutB.exe" install3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Roaming\RedrabCut\2345pcsafe_828181.exeC:\Users\Admin\AppData\Roaming\RedrabCut\2345pcsafe_828181.exe4⤵PID:2944
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe" --type=install --installtype=new --lockExplorerKB=1 --lockIEState=0 --lock3rdState=0 --lockBrowserState=1 --silent=15⤵PID:3892
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://code.51.com/2qiay5p6/5z44d/76fjpd0z92.html?gywg7=sxsb0112_4⤵PID:5072
-
-
-
C:\Program Files (x86)\RedrabCut\RedrabCutT.exe"C:\Program Files (x86)\RedrabCut\RedrabCutT.exe" install3⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /TN _Newdd_dddhjhs_sjkhdjks_RedrabCut_e3df_TEE /f4⤵PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn _Newdd_dddhjhs_sjkhdjks_RedrabCut_e3df_TEE /tr "\"C:\Program Files (x86)\RedrabCut\RedrabCutB.exe\" taskactive" /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:1580
-
-
-
C:\Program Files (x86)\RedrabCut\RedrabCutDesk.exe"C:\Program Files (x86)\RedrabCut\RedrabCutDesk.exe" install3⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\RedrabCut\RedrabCut64.dll" DllGetClassObjectEx4⤵PID:1532
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\RedrabCut\RedrabCut64.dll" DllGetClassObjectEx5⤵PID:2836
-
-
-
-
C:\Program Files (x86)\RedrabCut\RedrabCut.exe"C:\Program Files (x86)\RedrabCut\RedrabCut.exe" install3⤵
- Executes dropped EXE
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\FZip_V70010.exe"C:\Users\Admin\AppData\Local\Temp\FZip_V70010.exe" /s2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\FZip\3.11.26.1\FZipShellx64.dll" /s3⤵PID:2540
-
C:\Windows\system32\regsvr32.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipShellx64.dll" /s4⤵PID:1712
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Program Files (x86)\FZip\3.11.26.1\FZipHelpx64.dll" /s3⤵PID:748
-
C:\Windows\system32\regsvr32.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipHelpx64.dll" /s4⤵
- Modifies registry class
PID:2564
-
-
-
C:\Program Files (x86)\FZip\3.11.26.1\FZip.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZip.exe" /default3⤵
- Executes dropped EXE
- Modifies registry class
PID:2288
-
-
C:\Program Files (x86)\FZip\3.11.26.1\FZipService.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipService.exe" /fsvc=autoins3⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup_wnhfdskb006.exe"C:\Users\Admin\AppData\Local\Temp\setup_wnhfdskb006.exe" 8132⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2168 -
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" b09 --20f7=wnhfdskb0062201293⤵
- Executes dropped EXE
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup_App_notebook1002.exe"C:\Users\Admin\AppData\Local\Temp\Setup_App_notebook1002.exe" /QNC=52EZG8Y3MN2⤵
- Executes dropped EXE
PID:1536
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2604
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k SunnyDay_updatesvc1⤵PID:2636
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k SunnyDay_updatesvc1⤵PID:2864
-
C:\Program Files (x86)\FZip\3.11.26.1\FZipService.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipService.exe"1⤵
- Executes dropped EXE
PID:2892 -
C:\Program Files (x86)\FZip\3.11.26.1\FZipUpdate.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipUpdate.exe"2⤵PID:3752
-
-
C:\Program Files (x86)\FZip\3.11.26.1\FZipTalnc.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipTalnc.exe" M2oJODhqcmp/amRqCyAmISxqcmp/eHh5eGpkagENanJqeXlqZGoeLTpqcmp7Znl5Znp+ZnlqZGoJLDtqcn57ZGoOOiVqcnk12⤵PID:360
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalServiceZpRestricted1⤵PID:2244
-
C:\Program Files (x86)\WnRecovery\WRSvn.exe"C:\Program Files (x86)\WnRecovery\WRSvn.exe" a911⤵
- Executes dropped EXE
PID:1612 -
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" 217 --ba56=02⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2176 -
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" 788 --ba56=03⤵PID:2776
-
-
-
C:\Program Files (x86)\WnRecovery\WRUpade.exe"C:\Program Files (x86)\WnRecovery\WRUpade.exe" 5272⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k MrWReSvuter1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2372
-
C:\Program Files (x86)\QuanTxtReader\QuanNotePad.exe"C:\Program Files (x86)\QuanTxtReader\QuanNotePad.exe"1⤵
- Executes dropped EXE
PID:2516
-
C:\Program Files (x86)\FZip\3.11.26.1\FZip.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZip.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2660
-
C:\Program Files (x86)\SuiXinNote\SuiXinDaemon.exe"C:\Program Files (x86)\SuiXinNote\SuiXinDaemon.exe"1⤵
- Executes dropped EXE
PID:3160 -
C:\Program Files (x86)\SuiXinNote\AutoUpdate.exe"AutoUpdate.exe" /fm=3 /ui=02⤵PID:3584
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k NetworkServiceForSXImp1⤵PID:3192
-
C:\Program Files (x86)\RedrabCut\RedrabCutB.exedeskactive1⤵
- Executes dropped EXE
PID:3332
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll1⤵PID:3660
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k HEINOTEUPDATE1⤵PID:3680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k HEINOTEUPDATE1⤵
- Modifies data under HKEY_USERS
PID:3692 -
C:\users\admin\appdata\roaming\heinote\hnote.exe"C:\users\admin\appdata\roaming\heinote\hnote.exe" -fix2⤵PID:4012
-
C:\users\admin\appdata\roaming\heinote\hnote.exe"C:\users\admin\appdata\roaming\heinote\hnote.exe" -fix3⤵
- Writes to the Master Boot Record (MBR)
PID:3336
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\updateservice.exeC:\Users\Admin\AppData\Roaming\Heinote\updateservice.exe1⤵PID:3804
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -fix2⤵PID:3088
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -fix3⤵PID:3412
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exeC:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵PID:996
-
C:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exe 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3⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
PID:3776
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exeC:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵PID:3156
-
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE3⤵PID:3988
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exeC:\Users\Admin\AppData\Roaming\Heinote\feedback.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
- Writes to the Master Boot Record (MBR)
PID:3236 -
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe flUQxCBZGk175BGLJmBetA7+UwsCEeXEwcgUYL/QSH0seLVcKF3bCQZwjluOr2g5iJy3Cf9nKNxW1KL4/cOg9aTZGFppEp09cVcaTmSVc4dEIFGQ2PUEXJEgxCrubsiRs7E4dFQ8Am4GmxeFMxTjdlxK2mdqF39bq1QIIuxsPKmCqlpBLeqgnX5MSNArcQ5DEV9Gr9ij8BVz5AVEWuDBsE5HLcyhnbzjhLYuEmG6kDgtNuJcVZgJmVNAEENC900p/IBTDu7nAED+Dhft3JBU8civodNLsuVoZESu/LIKT5S9Pbe5Xn9bLEWP0iNunuleR8F9/4Slwgg1hEUQDkIPEfh3R391gze6h22+WnB57Dio+tdtRL6HhG4L8uAM/ZTuI7cZDcRC1vHtET7X/v1Gmi/18wajTgGuj7/s/CMEa5aGuBeCU4HIGnxA16bMToblO+fvGh80UEw37aJBdoR7EHGpsicnozEuXB/HSOZlE4YpC3yftl647lS2fGc0HitZao5txe260CPD9U1U03wbKneywKi8Fg==3⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:3628
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exeC:\Users\Admin\AppData\Roaming\Heinote\feedback.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
- Writes to the Master Boot Record (MBR)
PID:3188
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exeC:\Users\Admin\AppData\Roaming\Heinote\feedback.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
- Writes to the Master Boot Record (MBR)
PID:3144 -
C:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exe 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⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:4020
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exeC:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
- Writes to the Master Boot Record (MBR)
PID:3168 -
C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exeC:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe --data=dv/aIOc1IEaN3fQfxceTbQpHQ7dAlAjMhTc2a9Iv9KKwIHACqkMOuRGXUavX75m6wvKQT0xWG4SlGRQtogjL999DhJR/xxKDIOMSeBn2hOiJqFF7oQs+ruC0/oUmaqB7LeqzBnPOgEGYCCkAUXN4RQDAAYatzqTJ07ynJF8HdMJEcgXdJoFguq6lcXcJVOM2FXk0Glo=3⤵
- Writes to the Master Boot Record (MBR)
PID:3660 -
C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe"C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe" --type=xzdll --project=s8uwaGTkiA==4⤵PID:3216
-
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exeC:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
- Writes to the Master Boot Record (MBR)
PID:2120 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exe 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3⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:3604
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exeC:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
- Writes to the Master Boot Record (MBR)
PID:2500 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 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3⤵PID:3400
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe I9ZymhtWw/Zi0E92qA/y7x8SZ+s4yUpNyI+hIjHFCL1iAr5FGOj+FauCxAveZClLoYUU9EWmejQnz6HP64Zowl7udJe7XN+/YM0x6omLxdGKRrKe96X5cR9gnXkfYMp4PKCi9PFb5zlJYMPVVR4G78WhfwUSupREyNjpndhu5fMclqE6KsqFCkEDvQ7b9uhGxQgMDiY/xs5t6cd/QDmc+0YhoFw7gsKFJOoL+Tt47sloar+5oWCEiSiDTSg/ZUfe9WNsJPeG6XEiDZURa4EGwcH67o4b2o8symRAkeTjFI6s2ErZaC5zEKRIGr/lqOa8x58/YzNjbM/UNQ6bNIMwZTu7VaZS63Cp60WI2waiK//snlkzts0lnMmbYlNTAoWjAihaBoh26ZPgmzP9dbkw4Ki6s3hfVyEMAUAxVTR+45uCDqa7zztsTrNuFRXHqjJA1QBjA7ES4IKiUxBjE/viy+gf2dMhCfjNkYSElUePtGtFSZG1L4rrBx1Y999MN+Z4B54zK8kxjWY/f7JpDbdlZtY/68SsK9M0zLOCrMr/S3brNy4r0J/Vj+OZZ5QvRU6yTokQPH2rYhNuD+kH/two/nfOoYSI2Crpp1koYVvgpwAEsgZ7QmuZ5dsL3U2RJpcApP0nuMqQTiIqSVLnIPALYjvy5br/dkOYLV4OkuUZpC67Oi8Xo5T0NNiOuteGUz1LC6xSIr8Dp5dcMd1g4KSfvnfyaVPdiyOR92hjnJcYXos1LSTqFto3zJlfcEiDEdG84X0kJgJA+WiDQA/IaBm3Tshsfw8aEJtKv9h2EYYaOdmeo0lxoJnkOVB35hygM2xsabOtBktYJdrsDwDQeUyOBHHRXH3UlG4vgSCQyCDk3qajtM4suT4NiIZeoyiokAVBZ/yLD1vtFu3iEgWUhF2A29GWiu5/VcK7rg33fF8sRekVsf08XKQPLwh9Z8iL5bH/CVZPU85zU6PIkPGJWUQWbQPN8RVnOsAB2RFzv+7d0UPK6UNlfCOGI0/z8YJO1VEGgz1R3⤵PID:3884
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe 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3⤵
- Writes to the Master Boot Record (MBR)
PID:3856
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exeC:\Users\Admin\AppData\Roaming\Heinote\feedback.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
- Writes to the Master Boot Record (MBR)
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exeC:\Users\Admin\AppData\Roaming\Heinote\feedback.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
- Writes to the Master Boot Record (MBR)
PID:3116 -
C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exeC:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe --data=dv/aIOc1IEaN3fQfxceTbQpHQ7dAlAjMhTc2a9Iv9KKwIHACqkMOuRGXUavX75m6wvKQT0xWG4SlGRQtogjL999DhJR/xxKDIOMSeBn2hOiJqFF7oQs+ruC0/oUmaqB7LeqzBnPOgEGYCCkAUXN4RQDAAYatzqTJ07ynJF8HdMJEcgXdJoFguq6lcXcJVOM2FXk0Glo=3⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:956 -
C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe"C:\Users\Admin\AppData\Roaming\Heinote\pingbao\pbxhone.exe" --type=xzdll --project=s8uwaGTkiA==4⤵PID:4048
-
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exeC:\Users\Admin\AppData\Roaming\Heinote\readmode.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵PID:3384
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exeC:\Users\Admin\AppData\Roaming\Heinote\readmode.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵PID:3440
-
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exeC:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=2⤵PID:3484
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exeC:\Users\Admin\AppData\Roaming\Heinote\readmode.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
- Writes to the Master Boot Record (MBR)
PID:3492
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exeC:\Users\Admin\AppData\Roaming\Heinote\readmode.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
- Writes to the Master Boot Record (MBR)
PID:3468 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exe 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3⤵PID:2080
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exeC:\Users\Admin\AppData\Roaming\Heinote\readmode.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵PID:1136
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe 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3⤵PID:3404
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exeC:\Users\Admin\AppData\Roaming\Heinote\Report.exe -param=dfCYNNpba0T2g3DwxQ==2⤵PID:3656
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Update.exeC:\Users\Admin\AppData\Roaming\Heinote\Update.exe -param=dfCYNNpbbFHijXbhxQ==2⤵
- Writes to the Master Boot Record (MBR)
PID:3688 -
C:\Users\Admin\AppData\Roaming\Heinote\update\Heinote_v3.3.0.2_guanwang_3.exe"C:\Users\Admin\AppData\Roaming\Heinote\update\Heinote_v3.3.0.2_guanwang_3.exe" -wjm -u=3 -t -w=03⤵PID:3736
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll4⤵PID:3208
-
C:\Windows\system32\regsvr32.exe/s /u C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll5⤵PID:3472
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll4⤵
- Writes to the Master Boot Record (MBR)
PID:996 -
C:\Windows\system32\regsvr32.exe/s /u C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll5⤵PID:3684
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\hnchecker.dll4⤵PID:4088
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg4⤵PID:3728
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll4⤵PID:3944
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll5⤵
- Modifies registry class
PID:2252
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -schedule4⤵PID:3648
-
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -install4⤵
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg"5⤵
- Runs .reg file with regedit
PID:2344
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll4⤵PID:3768
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll5⤵
- Modifies registry class
PID:2940
-
-
-
C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe"C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe" -install4⤵
- Writes to the Master Boot Record (MBR)
PID:1136
-
-
C:\Users\Admin\AppData\Roaming\Heinote\updateservice.exe"C:\Users\Admin\AppData\Roaming\Heinote\updateservice.exe" -install4⤵PID:3916
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"4⤵PID:3240
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\xinnote\shell64.dll4⤵PID:3784
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\xiaoyu\XYShellExt64.dll4⤵PID:3636
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\ShellExt64.dll4⤵PID:3116
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\xinnote\previewShell64.dll4⤵PID:1908
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\PVShellExt64.dll4⤵PID:3104
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\xiaoyu\XYChecker.dll4⤵PID:3712
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\Checker.dll4⤵PID:2360
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\xinnote\xinchecker.dll4⤵PID:3220
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe"C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe" -installmusic4⤵PID:2616
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\xiaoyu\XYShellExt64.dll4⤵PID:4068
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\xiaoyu\XYShellExt64.dll5⤵PID:908
-
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe"C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe" -installautorun4⤵PID:3540
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe"C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe" -schedule4⤵PID:4024
-
-
C:\Users\Admin\AppData\Roaming\xinnote\xinnote.exe"C:\Users\Admin\AppData\Roaming\xinnote\xinnote.exe" -fileassoc=14⤵PID:3096
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA5⤵PID:808
-
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe 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⤵PID:1176
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:2984
-
C:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exeC:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exe 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6⤵PID:2544
-
-
C:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exeC:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exe 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6⤵PID:4152
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:1616
-
C:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exeC:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exe kAOzuoLJU4L3HaC4PFeEC1gVvcJFmctKPdQh9veg5svCt03qCMKBouR6PiaAX7NXJRm4tnpAe2xHUAEg6BTbSI2GuVX52qbnvxiAdRsSE3VmGmqaVAshUPkE/nJhNwXf30HfBkNOIhpHoMCMyF9y0cgHpmoeZdSqkRdSnUeR0nOgQLiTkED0Lod1CSWtx8DXNathXfmGJKDHOKWp82WoDhPW1mICdAQnDXtT604/dnV5hMVI/RLLOLmgqfJFde0dcXuuod7jrWTa8H5ynW59CeWp5Yjf7lfEJDT6nPLMmhECo40JNAHe+InQQt/yjGA0Y6AU5Y9aD0YdYgSRijSsTEATBGFr7iDH8qXneI1b1IjT14KVrcc5F2jNWCYaC8BD2sI+Dj84vp6v+BAI/Rn+vVKP0FTXzNu8m3JQZkOIBHL1GfFvIWPRamApuUwTA75zC2CYfyu3r9TIjTx3Yx7wlAxCZ/Sm3ttORyBSROgFq/uZ6Osjxav61LYX9KUp+bk8d7nr/Pc03cj/JzK1Nnuag1mCHCBARBRkqrZ8XdiAWhaY+JrYpHbAaPTdL9gHzr0niWE9hhyXQCZiLEtDpkmdteo2xPvBfmGbIH8bHAlxAOsPiNTs/axxrMrM6taEyAZBNFgn5VnzPlInQGVRfssuLiyl5djybBzguAlMGu26V677r8nlvJWXGj7gkgrM8HSVv7xA5qhyRze4/lzAhaDHsnqFLLt4Jo3DDCWrt+zuhKwnC6SIL+ZFd5S3TtUOogVK6qd065ebTrBN64LrLipmEUL9HEWQZXXh5z1T8Q7v6flasOzRUgqE3v/O6PeQA5Pd+ttre5l1giWL9yceL8keZwhq/sPyT4V0M7oeAAMqb6/n1h++bSQ5xrPIg9EXtfZOZFuBl6tMc2d+uO7h3criNHr9efAcz9XKPebb/QWCvSSy9yDY4dcToModNwY596KoTiOIFdtwlOggdV18/g==6⤵PID:4116
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA5⤵PID:3648
-
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe 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⤵PID:4316
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:3540
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh5⤵PID:3232
-
C:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exeC:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exe 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⤵PID:4452
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh5⤵PID:2888
-
C:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exeC:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exe 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⤵PID:4484
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:1076
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA5⤵
- Writes to the Master Boot Record (MBR)
PID:1564 -
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe LVBST0pFQ1Q9eGlubm90ZSAtU3VwcG9ydE11bHRpRXhlPXRydWUgLXdyaXRldGNrPUxpdmVVcGRhdGUzNjAsNjMyIC11c2Vzc3Btb2RlPXRydWUgLXBiY3V0dGl0bGVuZXdzPS0xIC1zaG93V2VhdGhlcj1mYWxzZSAtVG9wVXJsPWh0dHA6Ly9kb3duMS54aW5ub3RlLm11eGluLmZ1bi90dWkvbWluaS90aXRsZS5wbmcgLXBwPTQyZGU4ZjA3NmE5MDUyMGFkYzJlOGRmMzYzY2NiZDEwIC1BbnRpTWFsaWNpb3VzQ2xpY2s9NjAvNTAwIC1hbGlnbj10b3AgLU1heFdlYkNsaWNrQ291bnQ9MiAtU2hvd0Nsb3NlTWVudT0xIC1vcHRpbWl6ZT0zMCAtY2xhc3NuYW1lPWJsdWVtIC10aXRsZT1taWJsdWUgLXRhc2tpZD10YXNraWQubWluaW5ld3MtMSAtTXV0ZXhOYW1lPUEwNzFFQThELUQzRkQtNERCMy04MjRDLTkxM0EyQUU3QTZENyAtSUU5VVJMPWh0dHA6Ly9uZXdzLjc2NTQuY29tL21pbmlfbmV3NC8zMDAxLz9xaWQ9anNiXzAwMSZlbnY9MyZ1aWQ9MjI5ODFFQzYwNEM0RkQyRjUzRkEwOEUzQjRDNTUwRTgmc2NyZWVuX2g9NzIwIC1VUkw9aHR0cDovL25ld3MuNzY1NC5jb20vbWluaV9uZXc0LzMwMDEvP3FpZD1qc2JfMDAxJmVudj0zJnVpZD0yMjk4MUVDNjA0QzRGRDJGNTNGQTA4RTNCNEM1NTBFOCZzY3JlZW5faD03MjAgLXJlcG9ydHByZWZpeD1taW5pbmV3cy0x6⤵PID:4308
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:812
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=5⤵PID:3140
-
C:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exeC:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exe FKF4NK2ZgKDFhrrLPPVKdBcZL41PyvSQ77PvXtMU4loJHHfg6h8uHMpYn/kG8VptQRzi3+VeiD/7Zh4nHf1J1PxkkbWkj+HIFJ/o9wtETeD9BmN4oBxJVOA8aZUL/ISN02bGB3nyk2y3GGw6K87u4ea/fg87FzH0rgK2rv2e0enrC4Zy41E7cc6aVYhQHNzzx9mt5PMoMiXh+Ji63lbchlKiFniPVuQ+qfojN3W8oin2o7I7li6Md5sx3t78UywG3TgcLuXSsaAIdvyt8iqrlEE205bH4eXWVDqY5YdS56AxltA7e/eGksuA22CLiWeM/fFB29frRJXqBocCvAJr1wKqG6wpvEWtoWxB6mEgMECHbJUFXTvINgBUggOKUVQjMsZAsY9UcRiBZXmxUiCKyfOFzF/596IKJLppSWz4rn3QpmA=6⤵PID:4044
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh5⤵PID:3264
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\xiaoyu\XYShellExtension64.dll4⤵PID:3932
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\xiaoyu\XYShellExtension64.dll5⤵PID:2672
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\PhotoViewer\PreviewExt64.dll4⤵
- Writes to the Master Boot Record (MBR)
PID:2144 -
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\PhotoViewer\PreviewExt64.dll5⤵PID:3564
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\PhotoViewer\PVShellExt64.dll4⤵PID:3596
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\xinnote\shell64.dll4⤵PID:2844
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\xinnote\shell64.dll5⤵PID:2312
-
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\XYReport.exe"C:\Users\Admin\AppData\Roaming\xiaoyu\XYReport.exe"4⤵PID:3608
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\xinnote\previewshell64.dll4⤵PID:2480
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\xinnote\previewshell64.dll5⤵PID:2264
-
-
-
C:\Users\Admin\AppData\Roaming\xinnote\report.exe"C:\Users\Admin\AppData\Roaming\xinnote\report.exe"4⤵PID:4748
-
-
-
-
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" 217 --ba56=21⤵PID:3848
-
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" 788 --ba56=22⤵PID:3884
-
-
C:\Program Files (x86)\WnRecovery\WRUtest.exe"C:\Program Files (x86)\WnRecovery\WRUtest.exe" 6df2⤵PID:3892
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k HEINOTEUPDATE1⤵
- Modifies data under HKEY_USERS
PID:3536
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-185649871519341012641083659501-2044893660651211611209695491602750465-1001364376"1⤵PID:3208
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -assoc1⤵PID:3560
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
- Writes to the Master Boot Record (MBR)
PID:2964 -
C:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exe 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2⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:3368
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
- Writes to the Master Boot Record (MBR)
PID:2388
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:3384 -
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵
- Writes to the Master Boot Record (MBR)
PID:3056
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:3988 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exe hOiw5m/4F02tIsYAVgBU08caEnPe58zKLHB4H6288kmKoAEF9l8ka+ASxKkRPdK/g4zR0hkciVZyxKWsZtV1Ws5K2AyQBUgpVNI2JX9yJIbHs9TH9jQnkQ1lhAv7OD0A9kzYNV+vWgylaFLgDnh+b3/BQ+6ztZbJWaU3a3GJ1nBhjNeNa9w6QCjbaKhYjWAsdUBotfOARlQR6flQ9mbYdAYimDcQnkWslr6ii43eFnVA3qRNbBKmUCsDkejk7smcobJpS6CG0hPYpEQkSrEdoaNt+ydpIUeJy8JMXPDgX+nkV+auVhcT4Wv1WsUyawYOCD9kMUZq318xkn24FP6uS8oPFAnoEto3EHd86NGz2VFeCl6z4Hxfg1731+KcPoHDhH9VACHywG6nmtWWSbrCHvQzFF40MYBeNhrnnidje5I+MT5LxiVbk3shxOStEAnPx0fCEeiZlXIHmCh9f91puffKqqNA7roxz7ZdmaiQqIi8LfAV/N2QDuC0NcCDdwVahVK0MrW/i4Js3N+FsMh1mCT1VwD6eLxc5WI2o8MGtVDPYVgGLloabM/xWVY+vlZRgVtVRy4NAku8bayF9VO3chvjJHsQvKxnOSQzs5oDdex7wCg81q4JbYYYxn0q+WrCl6KEij99Wh3zxbAIv1H8i+2XQbHD+MHy5PTYjQQhhaiKPGIHGK7UX2G1qw7oRnulVBrKwvArMcpt9ja6G/s2nfUP+WU4hIYJd3hzQ+LXAqO64JauzAeJE9XzCGUgjMgJ6TVXHrab6n0ktFAGgneF3DiE+NULpimRLi3fXzKPUJE6UGUoNn+ALF2nhUNoOee9+lYQdg==2⤵
- Writes to the Master Boot Record (MBR)
PID:1144
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:3896 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 1iRH+izlXyk7XhT4paqSo+mE6T3htUaF6qAt5iMCy1QYpDjZerOX9GWFxuJj+Xtf0XsgR6hMx1dWc28vOUnFamGtVVcj+ui2fWIZ5GmDI21fadvSeOk07TUlXE4Gz8LtwRq6mSjlrncjNxHxjDDk9B1cP/LyJiOEIuz2Yk1Zlab4Kpuw76RVslLqr7F9mzx9CxJxRIGC0fHHGLOgPepbRKQJm3wc3PvHyo0iilkKcyAlwTVVgww9NnnNLUnDBKF8em+CJv67FQdFZhKJ8uRqORtVtAl0b5TBFusopNyXBLvOp4Yj0EfBfqSBwOGD2DA0lXgMacq88jYOHluQPLcIi+hMtMiP9Yg/JOWLY0YU8T7j8NKfOK8rIhZ2C+Vl9vlla92n0YCrxegiQVVNS8w5UKX/XLlflWsXBcGCyobAYTcdYrGtqBC9O5zD70kYEOTDtQzZRNhA08EVIBomOR3bw0RkVaOVPAVgrWc2UdRiQqO+JIwdxEAg37DmYoJNauwvfOJ4XvWQ9jNhXSLNQgVEUbukzyc3S0k5JtDl5AFyHjBkeke2NXK6P0auLzDRXR0g7e1NWKUMUbZt3m2+t0fSu4nv9s9gBcluazhiM8LYYAR91HHX929lE7MM++OB9pU/qthI2CmFVSoZvpjmuIGzsgINxQ255h7Vxu8ad49ViJSuYMS9S+Y/P03zDT0rg7c8ROH4YfqK2QHqmbUl50FbwgfaoyzMh0kEIHfL8Tq+kGv0Fte9jl9JHCMfa/jSrrjxX909LYR1zSkF1+ZE2Ah+Cz12rByHHKv08Rr1DOfpUZtVsZoyyvfZFufLyXUw3QuEC5UxUBiVpNtoPQc/R538KahwOoopUe5RW8aYz0/tQqRV2isQBCqtAcTp7YxASYhOZM0ZLPfPXEnhBQr/SyR213EEUYBjwbfmCLQabhnQSmGegVO7a6baR+fZoRqlbLnri4rSACU5hvsYXI0kOvFU/edTIg1V10qtlBA2GSxHRtRkdo+AQQzpBi0kqgP1nxZhTAeAF448p2letItGTdeen9JBHV5B3A==2⤵PID:2484
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵PID:3108
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe 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2⤵PID:2480
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:1508
-
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵
- Writes to the Master Boot Record (MBR)
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
- Writes to the Master Boot Record (MBR)
PID:4068 -
C:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exe 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2⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
PID:2540
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:3160 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 1iRH+izlXyk7XhT4paqSo+mE6T3htUaF6qAt5iMCy1QYpDjZerOX9GWFxuJj+Xtf0XsgR6hMx1dWc28vOUnFamGtVVcj+ui2fWIZ5GmDI21fadvSeOk07TUlXE4Gz8LtwRq6mSjlrncjNxHxjDDk9B1cP/LyJiOEIuz2Yk1Zlab4Kpuw76RVslLqr7F9mzx9CxJxRIGC0fHHGLOgPepbRKQJm3wc3PvHyo0iilkKcyAlwTVVgww9NnnNLUnDBKF8em+CJv67FQdFZhKJ8uRqORtVtAl0b5TBFusopNyXBLvOp4Yj0EfBfqSBwOGD2DA0lXgMacq88jYOHluQPLcIi+hMtMiP9Yg/JOWLY0YU8T7j8NKfOK8rIhZ2C+Vl9vlla92n0YCrxegiQVVNS8w5UKX/XLlflWsXBcGCyobAYTcdYrGtqBC9O5zD70kYEOTDtQzZRNhA08EVIBomOR3bw0RkVaOVPAVgrWc2UdRiQqO+JIwdxEAg37DmYoJNauwvfOJ4XvWQ9jNhXSLNQgVEUbukzyc3S0k5JtDl5AFyHjBkeke2NXK6P0auLzDRXR0g7e1NWKUMUbZt3m2+t0fSu4nv9s9gBcluazhiM8LYYAR91HHX929lE7MM++OB9pU/qthI2CmFVSoZvpjmuIGzsgINxQ255h7Vxu8ad49ViJSuYMS9S+Y/P03zDT0rg7c8ROH4YfqK2QHqmbUl50FbwgfaoyzMh0kEIHfL8Tq+kGv0Fte9jl9JHCMfa/jSrrjxX909LYR1zSkF1+ZE2Ah+Cz12rByHHKv08Rr1DOfpUZtVsZoyyvfZFufLyXUw3QuEC5UxUBiVpNtoPQc/R538KahwOoopUe5RW8aYz0/tQqRV2isQBCqtAcTp7YxASYhOZM0ZLPfPXEnhBQr/SyR213EEUYBjwbfmCLQabhnQSmGegVO7a6baR+fZoRqlbLnri4rSACU5hvsYXI0kOvFU/edTIg1V10qtlBA2GSxHRtRkdo+AQQzpBi0kqgP1nxZhTAeAF448p2letItGTdeen9JBHV5B3A==2⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:3944
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵PID:2052
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe flUQxCBZGk175BGLJmBetA7+UwsCEeXEwcgUYL/QSH0seLVcKF3bCQZwjluOr2g5iJy3Cf9nKNxW1KL4/cOg9aTZGFppEp09cVcaTmSVc4dEIFGQ2PUEXJEgxCrubsiRs7E4dFQ8Am4GmxeFMxTjdlxK2mdqF39bq1QIIuxsPKmCqlpBLeqgnX5MSNArcQ5DEV9Gr9ij8BVz5AVEWuDBsE5HLcyhnbzjhLYuEmG6kDgtNuJcVZgJmVNAEENC900p/IBTDu7nAED+Dhft3JBU8civodNLsuVoZESu/LIKT5S9Pbe5Xn9bLEWP0iNunuleR8F9/4Slwgg1hEUQDkIPEfh3R391gze6h22+WnB57Dio+tdtRL6HhG4L8uAM/ZTuI7cZDcRC1vHtET7X/v1Gmi/18wajTgGuj7/s/CMEa5aGuBeCU4HIGnxA16bMToblO+fvGh80UEw37aJBdoR7EHGpsicnozEuXB/HSOZlE4YpC3yftl647lS2fGc0HitZao5txe260CPD9U1U03wbKneywKi8Fg==2⤵
- Writes to the Master Boot Record (MBR)
PID:3340
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:3700 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exe hOiw5m/4F02tIsYAVgBU08caEnPe58zKLHB4H6288kmKoAEF9l8ka+ASxKkRPdK/g4zR0hkciVZyxKWsZtV1Ws5K2AyQBUgpVNI2JX9yJIbHs9TH9jQnkQ1lhAv7OD0A9kzYNV+vWgylaFLgDnh+b3/BQ+6ztZbJWaU3a3GJ1nBhjNeNa9w6QCjbaKhYjWAsdUBotfOARlQR6flQ9mbYdAYimDcQnkWslr6ii43eFnVA3qRNbBKmUCsDkejk7smcobJpS6CG0hPYpEQkSrEdoaNt+ydpIUeJy8JMXPDgX+nkV+auVhcT4Wv1WsUyawYOCD9kMUZq318xkn24FP6uS8oPFAnoEto3EHd86NGz2VFeCl6z4Hxfg1731+KcPoHDhH9VACHywG6nmtWWSbrCHvQzFF40MYBeNhrnnidje5I+MT5LxiVbk3shxOStEAnPx0fCEeiZlXIHmCh9f91puffKqqNA7roxz7ZdmaiQqIi8LfAV/N2QDuC0NcCDdwVahVK0MrW/i4Js3N+FsMh1mCT1VwD6eLxc5WI2o8MGtVDPYVgGLloabM/xWVY+vlZRgVtVRy4NAku8bayF9VO3chvjJHsQvKxnOSQzs5oDdex7wCg81q4JbYYYxn0q+WrCl6KEij99Wh3zxbAIv1H8i+2XQbHD+MHy5PTYjQQhhaiKPGIHGK7UX2G1qw7oRnulVBrKwvArMcpt9ja6G/s2nfUP+WU4hIYJd3hzQ+LXAqO64JauzAeJE9XzCGUgjMgJ6TVXHrab6n0ktFAGgneF3DiE+NULpimRLi3fXzKPUJE6UGUoNn+ALF2nhUNoOee9+lYQdg==2⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
- Writes to the Master Boot Record (MBR)
PID:4088
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:1144
-
C:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\25PG34\xiaoheiminixhtt.exe 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2⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
PID:4012
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Update.exe"C:\Users\Admin\AppData\Roaming\Heinote\Update.exe" -param=dfCYNNpbbFHijXbhxQ==1⤵PID:3272
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=1⤵PID:4012
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵PID:3328
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:2312 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsxhtt.exe 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2⤵PID:3076
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:2724 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 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2⤵PID:4024
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵PID:3684
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe 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2⤵PID:3632
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:3704
-
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵PID:524
-
-
C:\Users\Admin\AppData\Roaming\Heinote\Update.exe"C:\Users\Admin\AppData\Roaming\Heinote\Update.exe" -param=dfCYNNpbbFHijXbhxQ==1⤵PID:3028
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=1⤵PID:3756
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
- Writes to the Master Boot Record (MBR)
PID:3544
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:4056
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:1344
-
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 1iRH+izlXyk7XhT4paqSo+mE6T3htUaF6qAt5iMCy1QYpDjZerOX9GWFxuJj+Xtf0XsgR6hMx1dWc28vOUnFamGtVVcj+ui2fWIZ5GmDI21fadvSeOk07TUlXE4Gz8LtwRq6mSjlrncjNxHxjDDk9B1cP/LyJiOEIuz2Yk1Zlab4Kpuw76RVslLqr7F9mzx9CxJxRIGC0fHHGLOgPepbRKQJm3wc3PvHyo0iilkKcyAlwTVVgww9NnnNLUnDBKF8em+CJv67FQdFZhKJ8uRqORtVtAl0b5TBFusopNyXBLvOp4Yj0EfBfqSBwOGD2DA0lXgMacq88jYOHluQPLcIi+hMtMiP9Yg/JOWLY0YU8T7j8NKfOK8rIhZ2C+Vl9vlla92n0YCrxegiQVVNS8w5UKX/XLlflWsXBcGCyobAYTcdYrGtqBC9O5zD70kYEOTDtQzZRNhA08EVIBomOR3bw0RkVaOVPAVgrWc2UdRiQqO+JIwdxEAg37DmYoJNauwvfOJ4XvWQ9jNhXSLNQgVEUbukzyc3S0k5JtDl5AFyHjBkeke2NXK6P0auLzDRXR0g7e1NWKUMUbZt3m2+t0fSu4nv9s9gBcluazhiM8LYYAR91HHX929lE7MM++OB9pU/qthI2CmFVSoZvpjmuIGzsgINxQ255h7Vxu8ad49ViJSuYMS9S+Y/P03zDT0rg7c8ROH4YfqK2QHqmbUl50FbwgfaoyzMh0kEIHfL8Tq+kGv0Fte9jl9JHCMfa/jSrrjxX909LYR1zSkF1+ZE2Ah+Cz12rByHHKv08Rr1DOfpUZtVsZoyyvfZFufLyXUw3QuEC5UxUBiVpNtoPQc/R538KahwOoopUe5RW8aYz0/tQqRV2isQBCqtAcTp7YxASYhOZM0ZLPfPXEnhBQr/SyR213EEUYBjwbfmCLQabhnQSmGegVO7a6baR+fZoRqlbLnri4rSACU5hvsYXI0kOvFU/edTIg1V10qtlBA2GSxHRtRkdo+AQQzpBi0kqgP1nxZhTAeAF448p2letItGTdeen9JBHV5B3A==2⤵PID:1564
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵PID:3028
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe 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2⤵
- Writes to the Master Boot Record (MBR)
PID:2480
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:2180 -
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵PID:3136
-
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
- Writes to the Master Boot Record (MBR)
PID:4052
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
- Writes to the Master Boot Record (MBR)
PID:3904
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:3140
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:2776
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe 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⤵PID:2956
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe flUQxCBZGk175BGLJmBetA7+UwsCEeXEwcgUYL/QSH0seLVcKF3bCQZwjluOr2g5iJy3Cf9nKNxW1KL4/cOg9aTZGFppEp09cVcaTmSVc4dEIFGQ2PUEXJEgxCrubsiRs7E4dFQ8Am4GmxeFMxTjdlxK2mdqF39bq1QIIuxsPKmCqlpBLeqgnX5MSNArcQ5DEV9Gr9ij8BVz5AVEWuDBsE5HLcyhnbzjhLYuEmG6kDgtNuJcVZgJmVNAEENC900p/IBTDu7nAED+Dhft3JBU8civodNLsuVoZESu/LIKT5S9Pbe5Xn9bLEWP0iNunuleR8F9/4Slwgg1hEUQDkIPEfh3R391gze6h22+WnB57Dio+tdtRL6HhG4L8uAM/ZTuI7cZDcRC1vHtET7X/v1Gmi/18wajTgGuj7/s/CMEa5aGuBeCU4HIGnxA16bMToblO+fvGh80UEw37aJBdoR7EHGpsicnozEuXB/HSOZlE4YpC3yftl647lS2fGc0HitZao5txe260CPD9U1U03wbKneywKi8Fg==2⤵PID:3224
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:2844
-
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵
- Writes to the Master Boot Record (MBR)
PID:540
-
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:3600
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
- Writes to the Master Boot Record (MBR)
PID:2072
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
- Writes to the Master Boot Record (MBR)
PID:3612
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
- Writes to the Master Boot Record (MBR)
PID:2672 -
C:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exeC:\Users\Admin\AppData\Roaming\Heinote\12CD_allall\xiaoheitipsrytx.exe 1iRH+izlXyk7XhT4paqSo+mE6T3htUaF6qAt5iMCy1QYpDjZerOX9GWFxuJj+Xtf0XsgR6hMx1dWc28vOUnFamGtVVcj+ui2fWIZ5GmDI21fadvSeOk07TUlXE4Gz8LtwRq6mSjlrncjNxHxjDDk9B1cP/LyJiOEIuz2Yk1Zlab4Kpuw76RVslLqr7F9mzx9CxJxRIGC0fHHGLOgPepbRKQJm3wc3PvHyo0iilkKcyAlwTVVgww9NnnNLUnDBKF8em+CJv67FQdFZhKJ8uRqORtVtAl0b5TBFusopNyXBLvOp4Yj0EfBfqSBwOGD2DA0lXgMacq88jYOHluQPLcIi+hMtMiP9Yg/JOWLY0YU8T7j8NKfOK8rIhZ2C+Vl9vlla92n0YCrxegiQVVNS8w5UKX/XLlflWsXBcGCyobAYTcdYrGtqBC9O5zD70kYEOTDtQzZRNhA08EVIBomOR3bw0RkVaOVPAVgrWc2UdRiQqO+JIwdxEAg37DmYoJNauwvfOJ4XvWQ9jNhXSLNQgVEUbukzyc3S0k5JtDl5AFyHjBkeke2NXK6P0auLzDRXR0g7e1NWKUMUbZt3m2+t0fSu4nv9s9gBcluazhiM8LYYAR91HHX929lE7MM++OB9pU/qthI2CmFVSoZvpjmuIGzsgINxQ255h7Vxu8ad49ViJSuYMS9S+Y/P03zDT0rg7c8ROH4YfqK2QHqmbUl50FbwgfaoyzMh0kEIHfL8Tq+kGv0Fte9jl9JHCMfa/jSrrjxX909LYR1zSkF1+ZE2Ah+Cz12rByHHKv08Rr1DOfpUZtVsZoyyvfZFufLyXUw3QuEC5UxUBiVpNtoPQc/R538KahwOoopUe5RW8aYz0/tQqRV2isQBCqtAcTp7YxASYhOZM0ZLPfPXEnhBQr/SyR213EEUYBjwbfmCLQabhnQSmGegVO7a6baR+fZoRqlbLnri4rSACU5hvsYXI0kOvFU/edTIg1V10qtlBA2GSxHRtRkdo+AQQzpBi0kqgP1nxZhTAeAF448p2letItGTdeen9JBHV5B3A==2⤵PID:3492
-
-
C:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exeC:\Users\Admin\AppData\Roaming\diuehijhrf\siuywteinbg.exe I9ZymhtWw/Zi0E92qA/y7x8SZ+s4yUpNyI+hIjHFCL1iAr5FGOj+FauCxAveZClLoYUU9EWmejQnz6HP64Zowl7udJe7XN+/YM0x6omLxdGKRrKe96X5cR9gnXkfYMp4PKCi9PFb5zlJYMPVVR4G78WhfwUSupREyNjpndhu5fMclqE6KsqFCkEDvQ7b9uhGxQgMDiY/xs5t6cd/QDmc+0YhoFw7gsKFJOoL+Tt47sloar+5oWCEiSiDTSg/ZUfe9WNsJPeG6XEiDZURa4EGwcH67o4b2o8symRAkeTjFI6s2ErZaC5zEKRIGr/lqOa8x58/YzNjbM/UNQ6bNIMwZTu7VaZS63Cp60WI2waiK//snlkzts0lnMmbYlNTAoWjAihaBoh26ZPgmzP9dbkw4Ki6s3hfVyEMAUAxVTR+45uCDqa7zztsTrNuFRXHqjJA1QBjA7ES4IKiUxBjE/viy+gf2dMhCfjNkYSElUePtGtFSZG1L4rrBx1Y999MN+Z4B54zK8kxjWY/f7JpDbdlZtY/68SsK9M0zLOCrMr/S3brNy4r0J/Vj+OZZ5QvRU6yTokQPH2rYhNuD+kH/two/nfOoYSI2Crpp1koYVvgpwAEsgZ7QmuZ5dsL3U2RJpcApP0nuMqQTiIqSVLnIPALYjvy5br/dkOYLV4OkuUZpC67Oi8Xo5T0NNiOuteGUz1LC6xSIr8Dp5dcMd1g4KSfvnfyaVPdiyOR92hjnJcYXos1LSTqFto3zJlfcEiDEdG84X0kJgJA+WiDQA/IaBm3Tshsfw8aEJtKv9h2EYYaOdmeo0lxoJnkOVB35hygM2xsabOtBktYJdrsDwDQeUyOBHHRXH3UlG4vgSCQyCDk3qajtM4suT4NiIZeoyiokAVBZ/yLD1vtFu3iEgWUhF2A29GWiu5/VcK7rg33fF8sRekVsf08XKQPLwh9Z8iL5bH/CVZPU85zU6PIkPGJWUQWbQPN8RVnOsAB2RFzv+7d0UPK6UNlfCOGI0/z8YJO1VEGgz1R2⤵PID:3940
-
-
C:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exeC:\Users\Admin\AppData\Roaming\jsbyptp\Jsbyptp.exe flUQxCBZGk175BGLJmBetA7+UwsCEeXEwcgUYL/QSH0seLVcKF3bCQZwjluOr2g5iJy3Cf9nKNxW1KL4/cOg9aTZGFppEp09cVcaTmSVc4dEIFGQ2PUEXJEgxCrubsiRs7E4dFQ8Am4GmxeFMxTjdlxK2mdqF39bq1QIIuxsPKmCqlpBLeqgnX5MSNArcQ5DEV9Gr9ij8BVz5AVEWuDBsE5HLcyhnbzjhLYuEmG6kDgtNuJcVZgJmVNAEENC900p/IBTDu7nAED+Dhft3JBU8civodNLsuVoZESu/LIKT5S9Pbe5Xn9bLEWP0iNunuleR8F9/4Slwgg1hEUQDkIPEfh3R391gze6h22+WnB57Dio+tdtRL6HhG4L8uAM/ZTuI7cZDcRC1vHtET7X/v1Gmi/18wajTgGuj7/s/CMEa5aGuBeCU4HIGnxA16bMToblO+fvGh80UEw37aJBdoR7EHGpsicnozEuXB/HSOZlE4YpC3yftl647lS2fGc0HitZao5txe260CPD9U1U03wbKneywKi8Fg==2⤵
- Writes to the Master Boot Record (MBR)
PID:3888
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:3216
-
C:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exeC:\Users\Admin\AppData\Roaming\Heinote\tray\heipan.exe NoxE9djjteob70kT8Gvu7DNUoZYIHgPB8m1/rGnDoZCF5CUlLUTUBa9dn1EKMdW9dvwFcVyf0B8IuSRRbJfxVj46aTtdlPQ+VVtMbPnsJtiNF3Pgqe2upbLW9psoMyzD2CNGsaN1ApLHd3eU28G4C2bl1X5mdKmrv02sA8/EwcR9Qj3OIQYmOXkScLzF05m+tc+L60TxeglFbBbjQSNL+zIRiDOGVPUuILwajCmZ7V6kgHGLKqLxhUaZQZ31vQqI8UNxzI0ZgHphE1xU/BgXnTiMDhKlICOIUTJ3qPTNkD0scF/Qj1DhztMVPVNoHSs+60k4RaFPsdP86lzD3bOM/nTTndwKmkQmLaUEo8/lO3jEVgTh1dzZ1ZrBgLnIRn750NQzzTOImhzTcki5HYbGIdFyLiwzPz4e3pNHKxxolx48h4bowPyIq8c8I26PEN3IPPU6LsqNb7+G+icE2⤵PID:2144
-
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:3392
-
C:\Program Files (x86)\FZip\3.11.26.1\FZipG.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipG.exe" x -o"C:\Users\Admin\Downloads\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8" -slp- -an -ai#7zMap32662:190:7zEvent317261⤵PID:2080
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵PID:3916
-
C:\Windows\system32\taskeng.exetaskeng.exe {6D85A77B-D325-42CA-87FC-9F7223B5BA4E} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵PID:360
-
C:\Users\Admin\AppData\Roaming\uijefwuC:\Users\Admin\AppData\Roaming\uijefwu2⤵PID:2920
-
-
C:\Users\Admin\AppData\Roaming\iujefwuC:\Users\Admin\AppData\Roaming\iujefwu2⤵PID:3236
-
-
C:\Users\Admin\AppData\Roaming\Heinote\update.exeC:\Users\Admin\AppData\Roaming\Heinote\update.exe2⤵PID:3500
-
-
C:\Users\Admin\AppData\Roaming\xinnote\update.exeC:\Users\Admin\AppData\Roaming\xinnote\update.exe2⤵PID:4644
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\XYUpdate.exeC:\Users\Admin\AppData\Roaming\xiaoyu\XYUpdate.exe2⤵PID:4208
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "33928306-1208535564-1007498719-51592726-6492014152020178391276967814-1068026600"1⤵PID:1564
-
C:\Users\Admin\Downloads\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8.exe"C:\Users\Admin\Downloads\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8\68c309ec74f6dd5ec81d2fd23378a84b9d8091ccd28bc8e5f962fabd82e526f8.exe"1⤵PID:3068
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵PID:2360
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵PID:3060
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:2508
-
C:\Windows\system32\taskeng.exetaskeng.exe {BEE9FC98-FFAD-4B9D-AC42-EF909ACE1FF0} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2908
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exeC:\Users\Admin\AppData\Roaming\Heinote\hnote.exe -fix2⤵PID:748
-
-
C:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exeC:\Users\Admin\AppData\Roaming\xiaoyu\xiaoyu.exe -fix2⤵PID:2888
-
-
C:\Program Files (x86)\FZip\3.11.26.1\FZipG.exe"C:\Program Files (x86)\FZip\3.11.26.1\FZipG.exe" x -o"C:\Users\Admin\Downloads\2dbff57912795ed3890f08cc1bb0f437318e06645edf89b22674ea87d088c972" -slp- -an -ai#7zMap31275:190:7zEvent219121⤵PID:3208
-
C:\Windows\system32\pcwrun.exeC:\Windows\system32\pcwrun.exe "C:\Users\Admin\Downloads\2dbff57912795ed3890f08cc1bb0f437318e06645edf89b22674ea87d088c972\2dbff57912795ed3890f08cc1bb0f437318e06645edf89b22674ea87d088c972.exe"1⤵PID:2984
-
C:\Windows\System32\msdt.exeC:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW3D7E.xml /skip TRUE2⤵PID:4420
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:4336
-
C:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exeC:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exe QGTp35dN1K4nngZdia+DDq5qO8cTEG1mlvb066gl02Uh5v7zAGa0xmjajavauL/RGutjHmOivQEt818vClVflKytlQEjZJr45IeK8e+fEv8L4yZcopdZVqjLBbSRYr8dA3szwLejAobUHQQpeF0FvkpJqZKBZOx9Sno9u1zKDteyp/DOdgA9m2EKfgLE8fWJDv254Si7n489SUuIQhoNANraIUJjAjaxhDsDEafE6xWOWi00VeTRwzMLxHKKODCv6AFLykOnw+BjQwHcwNRfz4vF+n+RopvVn2j97jijKjnuTeXXxoYU4Yr9xanIG3FPk64GRvgGwpHGg4eggNjUfiFBGMY0uwdMlV9HE/vaE48c7/SxZUbMAYZii+BRxfEFwu0JMFLZZzwrnZZPzRpTr8YLeWHiu9n7qEqCcA6lyVOwbKvbCwv6q0HwsMxeT0Y9BoW8rpUcugdVHZFzD9RTZU9P8Eb0+ZiRwbc6/iILX8W0gvvP+0Ep4IGhetRfuJrhPTOMuBNe2NgjObdxZN2mwME4lPXsm2TXLXX5/SYWdsGTKEp+z4YSZXkAjtj6bUDeeAafJY2iuwv4OWAb1C6+PK5S7X4yqbe9HA8OwNk/jYI6wDxRIqmimJgiYspveMGtI9OB/Cxt4HB36m9DBthjMpikNAStYo5+CyV9EKwmb1IkQE9cnripx5lKJpTlC6RqribyUEDYoIIGdbYWR5tsC4FxaXW62+oGFQbFkMpf2riHkFXAvgGT8DvEnFhVeWyRb4CizIkKTpdJOm3lZSIwgb9CA5L0NjsLn0ySfjXG4RN4G2tX3MKFfMwMvJSETygPKDpfuqUmcEBKKmw6QfJo31kG1aimV4OEBPMgfx+HspWd6eKs7g6uwk4XTk+dSHgO79HeImYPN/8eG58nisflaxWeYnvUL80R32G72x3QDLJovel/XotIhcgjApufEwUg4UOtHa8=2⤵PID:4428
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:1564
-
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe 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⤵PID:3388
-
-
C:\Users\Admin\AppData\Roaming\xinnote\xinnote.exe"C:\Users\Admin\AppData\Roaming\xinnote\xinnote.exe" -assoc1⤵PID:4416
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵PID:4500
-
C:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exeC:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exe kAHgt+/7EJY7esGp35MFrwtOIzaH09su1/VA3oTCk/JzRoFNfcCaI5wOtxnnWYbVAKUl5jITId7hM9yeVDeUwW2VQa4M/N1EbN/knH59FEgypA4VJkaJzgM8znkxlo+62PKq3xek4GUXJWKjcAlkaG+dI50/lLGDqQedpI/dllVSmaHmTg/BXX2gpb+fP5Y/2LyWKPX//99rV2t2m6Niz2LDN9/KQ7Ps5Tu6t3PfmhTD/JjXnu81YhRfTXrW7MukWZRAYBV9BjLn2lzplywCcxs8u2igIXlCD7Gq/+BEkAcTdBT9hjdVQkTHdAtTA9B8JkTBu9r38MeEueCAJ34++HczZKqz4M2/N7UuiflJeXuEuWUjjkcefAuWS6YDwu0kA/x6krqGcsLHVmmtFtrnFTmL89FDrPVO4D2573We7z8zX7MAdOlII4A/i4umKaQ0RAhJkASKWC4kkWsSxbytvonBtdTRLGgZd5AsWePyU357TFvMihoHeCwOu5PZflkIKCuy6la+r88f1Rdzq89X4P+6wIWkup8ghlw8LcOjeCZUm1HA+1Ld9V+FrvrUVQrZmCW0qHPmEBTqYxE5M7+uX0LRK8y/JzQieBFHN3I4zgUGoTv5/ZxEiJGYYGeS5LJTC+tjmPKPFb1Mns7feBtFBl5UFbjKZy+EN0dThravUAtPauhjKKoMDq90/LtBOpCdAIQ8ekooNCSiMqw3ll3ITSE//aCgDx7dmm7owLS+XmiciwCOs96rhpr+r0HIuBwCl60xYdiOejPk6y/ThhueD7aWNi6fwI80KfPIo0MXjaax2⤵PID:4924
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:4568
-
C:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exeC:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exe FKF4NK2ZgKDFhrrLPPVKdBcZL41PyvSQ77PvXtMU4loJHHfg6h8uHMpYn/kG8VptQRzi3+VeiD/7Zh4nHf1J1PxkkbWkj+HIFJ/o9wtETeD9BmN4oBxJVOA8aZUL/ISN02bGB3nyk2y3GGw6K87u4ea/fg87FzH0rgK2rv2e0enrC4Zy41E7cc6aVYhQHNzzx9mt5PMoMiXh+Ji63lbchlKiFniPVuQ+qfojN3W8oin2o7I7li6Md5sx3t78UywG3TgcLuXSsaAIdvyt8iqrlEE205bH4eXWVDqY5YdS56AxltA7e/eGksuA22CLiWeM/fFB29frRJXqBocCvAJr1wKqG6wpvEWtoWxB6mEgMECHbJUFXTvINgBUggOKUVQjMsZAsY9UcRiBZXmxUiCKyfOFzF/596IKJLppSWz4rn3QpmA=2⤵PID:4740
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵PID:4548
-
C:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exeC:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exe kAHgt+/7EJY7esGp35MFrwtOIzaH09su1/VA3oTCk/JzRoFNfcCaI5wOtxnnWYbVAKUl5jITId7hM9yeVDeUwW2VQa4M/N1EbN/knH59FEgypA4VJkaJzgM8znkxlo+62PKq3xek4GUXJWKjcAlkaG+dI50/lLGDqQedpI/dllVSmaHmTg/BXX2gpb+fP5Y/2LyWKPX//99rV2t2m6Niz2LDN9/KQ7Ps5Tu6t3PfmhTD/JjXnu81YhRfTXrW7MukWZRAYBV9BjLn2lzplywCcxs8u2igIXlCD7Gq/+BEkAcTdBT9hjdVQkTHdAtTA9B8JkTBu9r38MeEueCAJ34++HczZKqz4M2/N7UuiflJeXuEuWUjjkcefAuWS6YDwu0kA/x6krqGcsLHVmmtFtrnFTmL89FDrPVO4D2573We7z8zX7MAdOlII4A/i4umKaQ0RAhJkASKWC4kkWsSxbytvonBtdTRLGgZd5AsWePyU357TFvMihoHeCwOu5PZflkIKCuy6la+r88f1Rdzq89X4P+6wIWkup8ghlw8LcOjeCZUm1HA+1Ld9V+FrvrUVQrZmCW0qHPmEBTqYxE5M7+uX0LRK8y/JzQieBFHN3I4zgUGoTv5/ZxEiJGYYGeS5LJTC+tjmPKPFb1Mns7feBtFBl5UFbjKZy+EN0dThravUAtPauhjKKoMDq90/LtBOpCdAIQ8ekooNCSiMqw3ll3ITSE//aCgDx7dmm7owLS+XmiciwCOs96rhpr+r0HIuBwCl60xYdiOejPk6y/ThhueD7aWNi6fwI80KfPIo0MXjaax2⤵PID:4864
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:4540
-
C:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exeC:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exe 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2⤵PID:4776
-
-
C:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exeC:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exe 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2⤵PID:2872
-
-
C:\Users\Admin\AppData\Roaming\xinnote\open.exe"C:\Users\Admin\AppData\Roaming\xinnote\open.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:4536
-
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe LVBST0pFQ1Q9eGlubm90ZSAtU3VwcG9ydE11bHRpRXhlPXRydWUgLXdyaXRldGNrPUxpdmVVcGRhdGUzNjAsNjMyIC11c2Vzc3Btb2RlPXRydWUgLXBiY3V0dGl0bGVuZXdzPS0xIC1zaG93V2VhdGhlcj1mYWxzZSAtVG9wVXJsPWh0dHA6Ly9kb3duMS54aW5ub3RlLm11eGluLmZ1bi90dWkvbWluaS90aXRsZS5wbmcgLXBwPTVlNzAzNmU4OTRmZDk5ZjZkZjNmNDJmOTIwNGI0OWRjIC1BbnRpTWFsaWNpb3VzQ2xpY2s9NjAvNTAwIC1hbGlnbj10b3AgLU1heFdlYkNsaWNrQ291bnQ9MiAtU2hvd0Nsb3NlTWVudT0xIC1vcHRpbWl6ZT0zMCAtY2xhc3NuYW1lPWJsdWVtIC10aXRsZT1taWJsdWUgLXRhc2tpZD10YXNraWQubWluaW5ld3MtMSAtTXV0ZXhOYW1lPUEwNzFFQThELUQzRkQtNERCMy04MjRDLTkxM0EyQUU3QTZENyAtSUU5VVJMPWh0dHA6Ly9uZXdzLjc2NTQuY29tL21pbmlfbmV3NC8zMDAxLz9xaWQ9anNiXzAwMSZlbnY9MyZ1aWQ9MjI5ODFFQzYwNEM0RkQyRjUzRkEwOEUzQjRDNTUwRTgmc2NyZWVuX2g9NzIwIC1VUkw9aHR0cDovL25ld3MuNzY1NC5jb20vbWluaV9uZXc0LzMwMDEvP3FpZD1qc2JfMDAxJmVudj0zJnVpZD0yMjk4MUVDNjA0QzRGRDJGNTNGQTA4RTNCNEM1NTBFOCZzY3JlZW5faD03MjAgLXJlcG9ydHByZWZpeD1taW5pbmV3cy0x2⤵PID:4664
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:3572
-
C:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exeC:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exe FKF4NK2ZgKDFhrrLPPVKdBcZL41PyvSQ77PvXtMU4loJHHfg6h8uHMpYn/kG8VptQRzi3+VeiD/7Zh4nHf1J1PxkkbWkj+HIFJ/o9wtETeD9BmN4oBxJVOA8aZUL/ISN02bGB3nyk2y3GGw6K87u4ea/fg87FzH0rgK2rv2e0enrC4Zy41E7cc6aVYhQHNzzx9mt5PMoMiXh+Ji63lbchlKiFniPVuQ+qfojN3W8oin2o7I7li6Md5sx3t78UywG3TgcLuXSsaAIdvyt8iqrlEE205bH4eXWVDqY5YdS56AxltA7e/eGksuA22CLiWeM/fFB29frRJXqBocCvAJr1wKqG6wpvEWtoWxB6mEgMECHbJUFXTvINgBUggOKUVQjMsZAsY9UcRiBZXmxUiCKyfOFzF/596IKJLppSWz4rn3QpmA=2⤵PID:5100
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵PID:4520
-
C:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exeC:\Users\Admin\AppData\Roaming\xinnote\mhuiy\jskugi.exe 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⤵PID:2284
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:4084
-
C:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exeC:\Users\Admin\AppData\Roaming\mkhbnhih\bhagywi.exe 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2⤵PID:4668
-
-
C:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exeC:\Users\Admin\AppData\Roaming\xinnote\dfasfhae\sfjhafurg.exe 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2⤵PID:1660
-
-
C:\Users\Admin\AppData\Roaming\xinnote\file.exe"C:\Users\Admin\AppData\Roaming\xinnote\file.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵PID:4496
-
C:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exeC:\Users\Admin\AppData\Roaming\blue\wallp\cjblue.exe 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⤵PID:5112
-
-
C:\Users\Admin\AppData\Roaming\xinnote\close.exe"C:\Users\Admin\AppData\Roaming\xinnote\close.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵PID:4440
-
C:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exeC:\Users\Admin\AppData\Roaming\xinnote\xin\xintray.exe FKF4NK2ZgKDFhrrLPPVKdBcZL41PyvSQ77PvXtMU4loJHHfg6h8uHMpYn/kG8VptQRzi3+VeiD/7Zh4nHf1J1PxkkbWkj+HIFJ/o9wtETeD9BmN4oBxJVOA8aZUL/ISN02bGB3nyk2y3GGw6K87u4ea/fg87FzH0rgK2rv2e0enrC4Zy41E7cc6aVYhQHNzzx9mt5PMoMiXh+Ji63lbchlKiFniPVuQ+qfojN3W8oin2o7I7li6Md5sx3t78UywG3TgcLuXSsaAIdvyt8iqrlEE205bH4eXWVDqY5YdS56AxltA7e/eGksuA22CLiWeM/fFB29frRJXqBocCvAJr1wKqG6wpvEWtoWxB6mEgMECHbJUFXTvINgBUggOKUVQjMsZAsY9UcRiBZXmxUiCKyfOFzF/596IKJLppSWz4rn3QpmA=2⤵PID:4364
-
-
C:\Users\Admin\AppData\Roaming\xinnote\update.exe"C:\Users\Admin\AppData\Roaming\xinnote\update.exe" -param=dfCYNNpbbFHijXbhxQ==1⤵PID:4576