Technical Information
- '<SYSTEM32>\taskkill.exe' /F /PID 1876
- '<SYSTEM32>\taskkill.exe' /F /PID 1556
- '<SYSTEM32>\taskkill.exe' /F /PID 4120
- '<SYSTEM32>\taskkill.exe' /F /PID 4300
- '<SYSTEM32>\taskkill.exe' /F /PID 4768
- <SYSTEM32>\cmd.exe
- firefox.exe
- %TEMP%\_mei28322\vcruntime140.dll
- %TEMP%\_mei28322\_asyncio.pyd
- %TEMP%\_mei28322\_bz2.pyd
- %TEMP%\_mei28322\_cffi_backend.cp311-win_amd64.pyd
- %TEMP%\_mei28322\_ctypes.pyd
- %TEMP%\_mei28322\_decimal.pyd
- %TEMP%\_mei28322\_hashlib.pyd
- %TEMP%\_mei28322\_lzma.pyd
- %TEMP%\_mei28322\_multiprocessing.pyd
- %TEMP%\_mei28322\_overlapped.pyd
- %TEMP%\_mei28322\_queue.pyd
- %TEMP%\_mei28322\_socket.pyd
- %TEMP%\_mei28322\_sqlite3.pyd
- %TEMP%\_mei28322\_ssl.pyd
- %TEMP%\_mei28322\_uuid.pyd
- %TEMP%\_mei28322\aiohttp\_http_parser.cp311-win_amd64.pyd
- %TEMP%\_mei28322\aiohttp\_http_writer.cp311-win_amd64.pyd
- %TEMP%\_mei28322\aiohttp\_websocket\mask.cp311-win_amd64.pyd
- %TEMP%\_mei28322\aiohttp\_websocket\reader_c.cp311-win_amd64.pyd
- %TEMP%\_mei28322\attrs-25.4.0.dist-info\installer
- %TEMP%\_mei28322\attrs-25.4.0.dist-info\metadata
- %TEMP%\_mei28322\attrs-25.4.0.dist-info\record
- %TEMP%\_mei28322\attrs-25.4.0.dist-info\wheel
- %TEMP%\_mei28322\attrs-25.4.0.dist-info\licenses\license
- %TEMP%\_mei28322\base_library.zip
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\installer
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\metadata
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\record
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\wheel
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\licenses\license
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\licenses\license.apache
- %TEMP%\_mei28322\cryptography-46.0.3.dist-info\licenses\license.bsd
- %TEMP%\_mei28322\cryptography\hazmat\bindings\_rust.pyd
- %TEMP%\_mei28322\frozenlist\_frozenlist.cp311-win_amd64.pyd
- %TEMP%\_mei28322\libcrypto-1_1.dll
- %TEMP%\_mei28322\libffi-8.dll
- %TEMP%\_mei28322\libssl-1_1.dll
- %TEMP%\_mei28322\multidict\_multidict.cp311-win_amd64.pyd
- %TEMP%\_mei28322\propcache\_helpers_c.cp311-win_amd64.pyd
- %TEMP%\_mei28322\pyexpat.pyd
- %TEMP%\_mei28322\python3.dll
- %TEMP%\_mei28322\python311.dll
- %TEMP%\_mei28322\select.pyd
- %TEMP%\_mei28322\sqlite3.dll
- %TEMP%\_mei28322\unicodedata.pyd
- %TEMP%\_mei28322\yarl\_quoting_c.cp311-win_amd64.pyd
- %TEMP%\c002y48y
- %LOCALAPPDATA%\exelaupdateservice\exela.exe
- %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\startup\exela.exe
- %TEMP%\historydata.db
- %TEMP%\downloaddata.db
- %TEMP%\autofilldata.db
- %TEMP%\5xtrsplj\5xtrsplj.0.cs
- %TEMP%\5xtrsplj\5xtrsplj.cmdline
- %TEMP%\5xtrsplj\5xtrsplj.out
- %TEMP%\5xtrsplj\csc3e0d61502a9246288a9ff9c62205253.tmp
- %TEMP%\res5877.tmp
- %TEMP%\5xtrsplj\5xtrsplj.dll
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\display (1).png
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\process_info.txt
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\browsers\firefox\history.txt
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\browsers\historys.txt
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\system_info.txt
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec\network_info.txt
- %TEMP%\d95d883b-f91d-4ce5-a5c5-d08bb6a85dec.zip
- %LOCALAPPDATA%\exelaupdateservice\exela.exe
- %TEMP%\c002y48y
- %TEMP%\historydata.db
- %TEMP%\autofilldata.db
- %TEMP%\res5877.tmp
- %TEMP%\5xtrsplj\csc3e0d61502a9246288a9ff9c62205253.tmp
- %TEMP%\5xtrsplj\5xtrsplj.dll
- %TEMP%\5xtrsplj\5xtrsplj.out
- %TEMP%\5xtrsplj\5xtrsplj.cmdline
- %TEMP%\5xtrsplj\5xtrsplj.0.cs
- %TEMP%\historydata.db
- %TEMP%\autofilldata.db
- 'localhost':49692
- 'localhost':49694
- 'localhost':49696
- 'localhost':49698
- 'localhost':49700
- 'ip##pi.com':80
- 'di###rdapp.com':443
- http://ip##pi.com/json
- '15#.#01.193.91':443
- 'localhost':49700
- 'di###rdapp.com':443
- DNS ASK ip##pi.com
- DNS ASK di###rdapp.com
- ClassName: '' WindowName: ''
- '<SYSTEM32>\cmd.exe' /c "ver"
- '<SYSTEM32>\cmd.exe' /c "wmic path win32_VideoController get name"
- '<SYSTEM32>\cmd.exe' /c "wmic computersystem get Manufacturer"
- '<SYSTEM32>\cmd.exe' /c "gdb --version"
- '<SYSTEM32>\cmd.exe' /c "tasklist"
- '<SYSTEM32>\wbem\wmic.exe' path win32_VideoController get name
- '<SYSTEM32>\wbem\wmic.exe' computersystem get Manufacturer
- '<SYSTEM32>\tasklist.exe'
- '<SYSTEM32>\cmd.exe' /c "wmic path Win32_ComputerSystem get Manufacturer"
- '<SYSTEM32>\wbem\wmic.exe' path Win32_ComputerSystem get Manufacturer
- '<SYSTEM32>\cmd.exe' /c "wmic csproduct get uuid"
- '<SYSTEM32>\wbem\wmic.exe' csproduct get uuid
- '<SYSTEM32>\cmd.exe' /c "attrib +h +s "%LOCALAPPDATA%\ExelaUpdateService\Exela.exe""
- '<SYSTEM32>\attrib.exe' +h +s "%LOCALAPPDATA%\ExelaUpdateService\Exela.exe"
- '<SYSTEM32>\cmd.exe' /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling t...
- '<SYSTEM32>\mshta.exe' "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program...
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 1876"
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 1556"
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4120"
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4300"
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4768"
- '<SYSTEM32>\cmd.exe' /c "cmd.exe /c chcp"
- '<SYSTEM32>\cmd.exe' /c "tasklist /FO LIST"
- '<SYSTEM32>\cmd.exe' /c "powershell.exe Get-Clipboard"
- '<SYSTEM32>\cmd.exe' /c chcp
- '<SYSTEM32>\tasklist.exe' /FO LIST
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' Get-Clipboard
- '<SYSTEM32>\chcp.com'
- '<SYSTEM32>\cmd.exe' /c "netsh wlan show profiles"
- '<SYSTEM32>\cmd.exe' /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic lo...
- '<SYSTEM32>\netsh.exe' wlan show profiles
- '<SYSTEM32>\systeminfo.exe'
- '<SYSTEM32>\hostname.exe'
- '<SYSTEM32>\wbem\wmic.exe' logicaldisk get caption,description,providername
- '<SYSTEM32>\net.exe' user
- '<SYSTEM32>\net1.exe' user
- '<SYSTEM32>\query.exe' user
- '<SYSTEM32>\quser.exe'
- '<SYSTEM32>\net.exe' localgroup
- '<SYSTEM32>\net1.exe' localgroup
- '<SYSTEM32>\net.exe' localgroup administrators
- '<SYSTEM32>\net1.exe' localgroup administrators
- '<SYSTEM32>\net.exe' user guest
- '<SYSTEM32>\net1.exe' user guest
- '<SYSTEM32>\net.exe' user administrator
- '<SYSTEM32>\net1.exe' user administrator
- '<SYSTEM32>\wbem\wmic.exe' startup get caption,command
- '<SYSTEM32>\tasklist.exe' /svc
- '<SYSTEM32>\ipconfig.exe' /all
- '<SYSTEM32>\route.exe' print
- '<SYSTEM32>\arp.exe' -a
- '<SYSTEM32>\netstat.exe' -ano
- '<SYSTEM32>\sc.exe' query type= service state= all
- '<SYSTEM32>\netsh.exe' firewall show state
- '<SYSTEM32>\netsh.exe' firewall show config
- '<SYSTEM32>\cmd.exe' /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbAB...
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC...
- '%WINDIR%\microsoft.net\framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @"%TEMP%\5xtrsplj\5xtrsplj.cmdline"
- '%WINDIR%\microsoft.net\framework64\v4.0.30319\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES5877.tmp" "%TEMP%\5xtrsplj\CSC3E0D61502A9246288A9FF9C62205253.TMP"
- '<SYSTEM32>\cmd.exe' /c "ver"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "wmic path win32_VideoController get name"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "wmic computersystem get Manufacturer"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "gdb --version"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "tasklist"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "wmic path Win32_ComputerSystem get Manufacturer"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "wmic csproduct get uuid"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "attrib +h +s "%LOCALAPPDATA%\ExelaUpdateService\Exela.exe""' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling t...' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 1876"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 1556"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4120"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4300"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "taskkill /F /PID 4768"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "cmd.exe /c chcp"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "tasklist /FO LIST"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "powershell.exe Get-Clipboard"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "netsh wlan show profiles"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic lo...' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbAB...' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @"%TEMP%\5xtrsplj\5xtrsplj.cmdline"' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v4.0.30319\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES5877.tmp" "%TEMP%\5xtrsplj\CSC3E0D61502A9246288A9FF9C62205253.TMP"' (with hidden window)